Resubmissions

05-03-2024 20:45

240305-zjqfasgh5w 8

05-03-2024 20:41

240305-zgv8rsgg9v 8

05-03-2024 20:40

240305-zga8lahg85 8

05-03-2024 20:37

240305-zemtlshg49 8

05-03-2024 20:34

240305-zcvfnshf78 8

05-03-2024 20:31

240305-zaq1gagf3t 8

05-03-2024 20:27

240305-y8p1dsge6w 8

General

  • Target

    OperaGXSetup.exe

  • Size

    3.4MB

  • Sample

    240305-zga8lahg85

  • MD5

    b16754e31096ff084460514287187a29

  • SHA1

    149d9d7bc7bfa0ee218e55eb3778ea3cf6184dc7

  • SHA256

    ada1f60b55545c1f8a59fd28d2a5fd37d9655e9f059857121e1d493fada33750

  • SHA512

    86fad8a6ee5660aac5a0fa172d6094585793cc6b86996941211292a9e91fc2571c8fa807a3021561909c841491400991f152f18c8e1d247c663ff600643224f7

  • SSDEEP

    98304:TWo5jp/vdcY8uC+gOhUL+byztZXlAuoVGmKeLEcjXXV9bA:TP59/VcYZCOW+bO+5Eo9c

Score
8/10

Malware Config

Targets

    • Target

      OperaGXSetup.exe

    • Size

      3.4MB

    • MD5

      b16754e31096ff084460514287187a29

    • SHA1

      149d9d7bc7bfa0ee218e55eb3778ea3cf6184dc7

    • SHA256

      ada1f60b55545c1f8a59fd28d2a5fd37d9655e9f059857121e1d493fada33750

    • SHA512

      86fad8a6ee5660aac5a0fa172d6094585793cc6b86996941211292a9e91fc2571c8fa807a3021561909c841491400991f152f18c8e1d247c663ff600643224f7

    • SSDEEP

      98304:TWo5jp/vdcY8uC+gOhUL+byztZXlAuoVGmKeLEcjXXV9bA:TP59/VcYZCOW+bO+5Eo9c

    Score
    8/10
    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks