General

  • Target

    OperaGXSetup (7).exe

  • Size

    5.7MB

  • Sample

    240612-nj99xswfnp

  • MD5

    7ab6c11a5378a0f1725d237d92994b02

  • SHA1

    16447d524ed7f72ce6a2e44e541bca20be9a7c86

  • SHA256

    ffc2307b9c526fc41f1df304ff2f432c647d533599b979decb7b56fe9887eff4

  • SHA512

    140cd064d6f7ac02068480e8ecc65e404a85ee4e296d2efdc194742c911811b99c64d269bc829d64fb193e7d08608cdd965d75845071528a763454a89a7d0c09

  • SSDEEP

    98304:O0NFJ6666666666666666666666666666666x666666666666666fwwwwwwwwwwi:DV8jGykui/8aUooy9hOjFMwSODnQW6vE

Score
7/10

Malware Config

Targets

    • Target

      OperaGXSetup (7).exe

    • Size

      5.7MB

    • MD5

      7ab6c11a5378a0f1725d237d92994b02

    • SHA1

      16447d524ed7f72ce6a2e44e541bca20be9a7c86

    • SHA256

      ffc2307b9c526fc41f1df304ff2f432c647d533599b979decb7b56fe9887eff4

    • SHA512

      140cd064d6f7ac02068480e8ecc65e404a85ee4e296d2efdc194742c911811b99c64d269bc829d64fb193e7d08608cdd965d75845071528a763454a89a7d0c09

    • SSDEEP

      98304:O0NFJ6666666666666666666666666666666x666666666666666fwwwwwwwwwwi:DV8jGykui/8aUooy9hOjFMwSODnQW6vE

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks