General

  • Target

    OperaGXSetup.exe

  • Size

    3.1MB

  • Sample

    240704-ep8hvatdrp

  • MD5

    df877cc1d259bf6744c398b28863e5de

  • SHA1

    8cb0cf8c3e4f1a183db00821d30b29549e50e819

  • SHA256

    d829d1164deaf2cd403debfb98bb2664f654f72ed1b0e427ee65254bc0b504b9

  • SHA512

    b6143b70d283b41c200075d99e1f6967b2f2e2740f33eb3a1baf8f8eeae20e0518d49ad82605561b2f4cabcb0e46eab4212ad3ef3e7e37ebfe0b8e3b058a763b

  • SSDEEP

    49152:hNEyYQPMB2nYlQWY9p/RxOgkDA5/uzsKFuaLU0kOyrRBzfMUNYpoMjw3:vEsY213Rx+87aLU0kPElq

Score
7/10

Malware Config

Targets

    • Target

      OperaGXSetup.exe

    • Size

      3.1MB

    • MD5

      df877cc1d259bf6744c398b28863e5de

    • SHA1

      8cb0cf8c3e4f1a183db00821d30b29549e50e819

    • SHA256

      d829d1164deaf2cd403debfb98bb2664f654f72ed1b0e427ee65254bc0b504b9

    • SHA512

      b6143b70d283b41c200075d99e1f6967b2f2e2740f33eb3a1baf8f8eeae20e0518d49ad82605561b2f4cabcb0e46eab4212ad3ef3e7e37ebfe0b8e3b058a763b

    • SSDEEP

      49152:hNEyYQPMB2nYlQWY9p/RxOgkDA5/uzsKFuaLU0kOyrRBzfMUNYpoMjw3:vEsY213Rx+87aLU0kPElq

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks