General
-
Target
OperaGXSetup (1).exe
-
Size
3.1MB
-
Sample
240825-cyfhbathlm
-
MD5
20b2c8ccf8d421fb95390f7b3ded67dc
-
SHA1
9f627e37794ad7f77c9598ea8936ba5384d73b90
-
SHA256
5b872004c47b8782b3b66e0c3f6837697bb76a4c613eed8559e97b87433e9f18
-
SHA512
5c17e7a52983ea73c88e525c15ac6c3d95828f74fbcd619c6a22bb50cbafee6d89be2198de3e6608bc1db9bd1f58ec50a44317788bf7b82af041a92acde184cc
-
SSDEEP
98304:YAcRTd/kggQSwydThBmnXodHG+z92I0xkZV8zDzSCh:iRTFkg3SwyhsXoRG+zAkZCzDz/h
Static task
static1
Behavioral task
behavioral1
Sample
OperaGXSetup (1).exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
OperaGXSetup (1).exe
-
Size
3.1MB
-
MD5
20b2c8ccf8d421fb95390f7b3ded67dc
-
SHA1
9f627e37794ad7f77c9598ea8936ba5384d73b90
-
SHA256
5b872004c47b8782b3b66e0c3f6837697bb76a4c613eed8559e97b87433e9f18
-
SHA512
5c17e7a52983ea73c88e525c15ac6c3d95828f74fbcd619c6a22bb50cbafee6d89be2198de3e6608bc1db9bd1f58ec50a44317788bf7b82af041a92acde184cc
-
SSDEEP
98304:YAcRTd/kggQSwydThBmnXodHG+z92I0xkZV8zDzSCh:iRTFkg3SwyhsXoRG+zAkZCzDz/h
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1