General

  • Target

    OperaGXSetup(1).exe

  • Size

    5.7MB

  • Sample

    240527-rz2jhafg51

  • MD5

    4433c1aafd91585ea93e222e1954e0bc

  • SHA1

    0b3541b7c3a688b9b914ef710a13418d6f1fba2e

  • SHA256

    1ca01074a9eabf046898491b8a45688bcc0c75fe3461a872cd069fba9746198f

  • SHA512

    706a7d3deb44eeaabdb986de6287fffe5e6d82cc7dd8dc3c390f8d4acef9c9071639b7406385c098df1601bb0a3b0bacda87a287159c6ba1f35cb59d9fa74900

  • SSDEEP

    98304:j0NFJ6666666666666666666666666666666x666666666666666fwwwwwwwwwwI:0V8jGykui/8aUooy9hOjFMwSODnQW6vO

Score
8/10

Malware Config

Targets

    • Target

      OperaGXSetup(1).exe

    • Size

      5.7MB

    • MD5

      4433c1aafd91585ea93e222e1954e0bc

    • SHA1

      0b3541b7c3a688b9b914ef710a13418d6f1fba2e

    • SHA256

      1ca01074a9eabf046898491b8a45688bcc0c75fe3461a872cd069fba9746198f

    • SHA512

      706a7d3deb44eeaabdb986de6287fffe5e6d82cc7dd8dc3c390f8d4acef9c9071639b7406385c098df1601bb0a3b0bacda87a287159c6ba1f35cb59d9fa74900

    • SSDEEP

      98304:j0NFJ6666666666666666666666666666666x666666666666666fwwwwwwwwwwI:0V8jGykui/8aUooy9hOjFMwSODnQW6vO

    Score
    8/10
    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks