General

  • Target

    OperaSetup.exe

  • Size

    5.1MB

  • Sample

    240428-pbaprsfg2v

  • MD5

    6c415de648071b95b060f8cbe8c88eba

  • SHA1

    27b21097670089eff4b7c127aaa01af9fefa40b4

  • SHA256

    3626c9d1bc732d84aa666896184cc3ce4e2f24571fb4b92965901e28d596427f

  • SHA512

    4e6c3008e61c2373bb820a6e2110042c68f254cfce6260aa67992da4072b3795a7f6a5d20c02ec40c8e54094d68be3e4fc4aba70227ac3329c986b96a06e6322

  • SSDEEP

    98304:10NFI6666666666666666666666666666666x666666666666666fwwwwwwwwwwi:HPMki6zio75L3pf3dedO4keCIwkoYbgC

Score
7/10

Malware Config

Targets

    • Target

      OperaSetup.exe

    • Size

      5.1MB

    • MD5

      6c415de648071b95b060f8cbe8c88eba

    • SHA1

      27b21097670089eff4b7c127aaa01af9fefa40b4

    • SHA256

      3626c9d1bc732d84aa666896184cc3ce4e2f24571fb4b92965901e28d596427f

    • SHA512

      4e6c3008e61c2373bb820a6e2110042c68f254cfce6260aa67992da4072b3795a7f6a5d20c02ec40c8e54094d68be3e4fc4aba70227ac3329c986b96a06e6322

    • SSDEEP

      98304:10NFI6666666666666666666666666666666x666666666666666fwwwwwwwwwwi:HPMki6zio75L3pf3dedO4keCIwkoYbgC

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks