General

  • Target

    OperaGXSetup.exe

  • Size

    3.4MB

  • Sample

    240419-3xw2sabf7v

  • MD5

    6cedc280bdb446734eb9c11a80acb78c

  • SHA1

    0c0927198b3c8483a1f17994d97164a9c39ba2cc

  • SHA256

    9c28fee190a873f79258bba9f695221a34ed65929f87dd77fc85309660ae95b7

  • SHA512

    db3a22d42f88509f67f822112d75b026a6145df36bec72a6633406927b565826d334d3d5a02eb73d1ccaf057baf520f9a63bf75a46ec73986b9f727e136fc7d7

  • SSDEEP

    98304:mWnL1M2XNmcGCVIps5phuIMAbvbJaJNQqPAbsU8968Vum8z22/:mWu2Qcvlh9vbvWobIbG3/

Score
8/10

Malware Config

Targets

    • Target

      OperaGXSetup.exe

    • Size

      3.4MB

    • MD5

      6cedc280bdb446734eb9c11a80acb78c

    • SHA1

      0c0927198b3c8483a1f17994d97164a9c39ba2cc

    • SHA256

      9c28fee190a873f79258bba9f695221a34ed65929f87dd77fc85309660ae95b7

    • SHA512

      db3a22d42f88509f67f822112d75b026a6145df36bec72a6633406927b565826d334d3d5a02eb73d1ccaf057baf520f9a63bf75a46ec73986b9f727e136fc7d7

    • SSDEEP

      98304:mWnL1M2XNmcGCVIps5phuIMAbvbJaJNQqPAbsU8968Vum8z22/:mWu2Qcvlh9vbvWobIbG3/

    Score
    8/10
    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks