General

  • Target

    OperaGXSetup (1).exe

  • Size

    3.1MB

  • Sample

    240803-exv8gsxgla

  • MD5

    3ff24a81ae3cfe0f5bad2904240743d8

  • SHA1

    503599a23b1a77f7cd0e155791db2ef8acdcce37

  • SHA256

    c6dc697b68f4744bfd38cfd8f62e179fd236ecbbcb7e7555fdabd2d30dac9f73

  • SHA512

    1e9cf2a7371546d25180c1be3059b2f90f1018104b55214a83ea25b633a90151a80140bb6c7d18fd98501c0ee79865d8d6b68f3df7d8ea597bd0c92861d0fd41

  • SSDEEP

    49152:eNEyYYC1hqiJckG38dBFOhg5/6qF3rjb/h4CNcTCP8xphzSNtOSe+aSc:UEP1y3+0hgh6u/ZcTCP8BzONaSc

Malware Config

Targets

    • Target

      OperaGXSetup (1).exe

    • Size

      3.1MB

    • MD5

      3ff24a81ae3cfe0f5bad2904240743d8

    • SHA1

      503599a23b1a77f7cd0e155791db2ef8acdcce37

    • SHA256

      c6dc697b68f4744bfd38cfd8f62e179fd236ecbbcb7e7555fdabd2d30dac9f73

    • SHA512

      1e9cf2a7371546d25180c1be3059b2f90f1018104b55214a83ea25b633a90151a80140bb6c7d18fd98501c0ee79865d8d6b68f3df7d8ea597bd0c92861d0fd41

    • SSDEEP

      49152:eNEyYYC1hqiJckG38dBFOhg5/6qF3rjb/h4CNcTCP8xphzSNtOSe+aSc:UEP1y3+0hgh6u/ZcTCP8BzONaSc

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks