General

  • Target

    OperaGXSetup.exe

  • Size

    3.4MB

  • Sample

    240805-kakfcs1dmq

  • MD5

    bd56f3bd19bbf9eb406b6a235362806f

  • SHA1

    73d086046896e22b2cc2c0a1e783a3917afc3d80

  • SHA256

    18d2d16e3ad07b9f59296e3357c5fe33b431c38f5c8658e77b5cba587124c563

  • SHA512

    a5457940beb20d9df7e91a5923b3c1f498100ad55ddb143e8e94e65f65382793e26022994d8c87ce22aa76743eed5a0aa4dc29d8419a76793aed7f3dfe212a26

  • SSDEEP

    98304:oWlL1+2WNmcGCVIps5phuIAFe5xHsc2JS9mihr+DywoS0yBBxdgZd:oWO3Qcvlh9A4fWmTyPo

Malware Config

Targets

    • Target

      OperaGXSetup.exe

    • Size

      3.4MB

    • MD5

      bd56f3bd19bbf9eb406b6a235362806f

    • SHA1

      73d086046896e22b2cc2c0a1e783a3917afc3d80

    • SHA256

      18d2d16e3ad07b9f59296e3357c5fe33b431c38f5c8658e77b5cba587124c563

    • SHA512

      a5457940beb20d9df7e91a5923b3c1f498100ad55ddb143e8e94e65f65382793e26022994d8c87ce22aa76743eed5a0aa4dc29d8419a76793aed7f3dfe212a26

    • SSDEEP

      98304:oWlL1+2WNmcGCVIps5phuIAFe5xHsc2JS9mihr+DywoS0yBBxdgZd:oWO3Qcvlh9A4fWmTyPo

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks