General

  • Target

    OperaGXSetup.exe

  • Size

    3.1MB

  • Sample

    240704-yqfc8sycpa

  • MD5

    4361cd63cd257e7c0c2b877aa1e2509f

  • SHA1

    a9f4924104c51dc7bcafc9e752f138d077ec26a4

  • SHA256

    0784140c6ea41b8eeb85f81186967ba0eb674188b37837755d06647630221ccd

  • SHA512

    32eb5d63483e693581dc6bdca8789cbed84a142c609dd488d63e7e953cd7d2c27027169362faa14c3f33b2660b611e33c93f3b9f54670c7613fb82df45325e72

  • SSDEEP

    49152:zNEyYQPMB2nYlQWY9p/RxOgkDA5/uzsKFuaLU0kOyrRBzfMUNYpoMjw+:JEsY213Rx+87aLU0kPElX

Score
8/10

Malware Config

Targets

    • Target

      OperaGXSetup.exe

    • Size

      3.1MB

    • MD5

      4361cd63cd257e7c0c2b877aa1e2509f

    • SHA1

      a9f4924104c51dc7bcafc9e752f138d077ec26a4

    • SHA256

      0784140c6ea41b8eeb85f81186967ba0eb674188b37837755d06647630221ccd

    • SHA512

      32eb5d63483e693581dc6bdca8789cbed84a142c609dd488d63e7e953cd7d2c27027169362faa14c3f33b2660b611e33c93f3b9f54670c7613fb82df45325e72

    • SSDEEP

      49152:zNEyYQPMB2nYlQWY9p/RxOgkDA5/uzsKFuaLU0kOyrRBzfMUNYpoMjw+:JEsY213Rx+87aLU0kPElX

    Score
    8/10
    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks