General

  • Target

    OperaSetup.exe

  • Size

    2.0MB

  • Sample

    240808-hl1kls1bjm

  • MD5

    285084c59cf68cbc4dcc52eba324118e

  • SHA1

    8542ebf486cea0d1a2771277f43b20538d59765b

  • SHA256

    88d4e83a6a31cd2e3c47ec0b306dea75dcfcc5fd8e8ee61343d984bee9959aee

  • SHA512

    59d7f6f53a9ee672ff608276f2e06ca549ed975db0ce8d2befc558325a802132dea95fa4ac11be9ad15437e5f5c681ca4080eb152db1468a1a9dc8dca2200eff

  • SSDEEP

    49152:xVAbwuGwKOco09gsJcxlV8fTguPOAItUIrhO5Ov4:XApQx5+Mc27g9tfoMv4

Malware Config

Targets

    • Target

      OperaSetup.exe

    • Size

      2.0MB

    • MD5

      285084c59cf68cbc4dcc52eba324118e

    • SHA1

      8542ebf486cea0d1a2771277f43b20538d59765b

    • SHA256

      88d4e83a6a31cd2e3c47ec0b306dea75dcfcc5fd8e8ee61343d984bee9959aee

    • SHA512

      59d7f6f53a9ee672ff608276f2e06ca549ed975db0ce8d2befc558325a802132dea95fa4ac11be9ad15437e5f5c681ca4080eb152db1468a1a9dc8dca2200eff

    • SSDEEP

      49152:xVAbwuGwKOco09gsJcxlV8fTguPOAItUIrhO5Ov4:XApQx5+Mc27g9tfoMv4

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks