General

  • Target

    OperaSetup.exe

  • Size

    2.0MB

  • Sample

    240814-v3p7esyhpm

  • MD5

    46d9a32ef057a3d92b1bd50603dcd71d

  • SHA1

    7d49c59c40e55508bbdfac1ce9092853616e36ad

  • SHA256

    6e5d09ba6174e6307630fbc0043e668ac7229f84d8f04c5a8decbcc2728f0aaa

  • SHA512

    e5c9cc90e60c74080220c1a2b4be9b484d29600c2b201b3d0d0d2e878bf260594723ff32a0f4f1cb87826e71e953445129d7ec97beb0443f1143c32055a71705

  • SSDEEP

    49152:kNEyYcQ78Kpjjxv6htWn1iTl0egZ3s0OSZsnh7f3kHMqL:SEP784oysWj3s0GhYMqL

Malware Config

Targets

    • Target

      OperaSetup.exe

    • Size

      2.0MB

    • MD5

      46d9a32ef057a3d92b1bd50603dcd71d

    • SHA1

      7d49c59c40e55508bbdfac1ce9092853616e36ad

    • SHA256

      6e5d09ba6174e6307630fbc0043e668ac7229f84d8f04c5a8decbcc2728f0aaa

    • SHA512

      e5c9cc90e60c74080220c1a2b4be9b484d29600c2b201b3d0d0d2e878bf260594723ff32a0f4f1cb87826e71e953445129d7ec97beb0443f1143c32055a71705

    • SSDEEP

      49152:kNEyYcQ78Kpjjxv6htWn1iTl0egZ3s0OSZsnh7f3kHMqL:SEP784oysWj3s0GhYMqL

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks