General

  • Target

    OperaGXSetup.exe

  • Size

    3.1MB

  • Sample

    240904-n7s1js1cqb

  • MD5

    0442b0b1f1c66652b51811b11f893ba0

  • SHA1

    9f71af6425b4e31059c52bff56f5bbcb4b3d7957

  • SHA256

    72900e3e5a2105b1c8420c343d6ff4348805969af8802aee60e40b29d23676ba

  • SHA512

    e134f21e7b4b86cdf37e7adb2862b7b0ce9fcb57e267420dfecf5570984911d3ccc930e47e80585cf361e3f15e4092dd6e3371509aa2046a276f604d18414c14

  • SSDEEP

    98304:AAcRTd/kggQSwydThBmnXodHG+z92I0xkZV8zDzSCG:aRTFkg3SwyhsXoRG+zAkZCzDz/G

Malware Config

Targets

    • Target

      OperaGXSetup.exe

    • Size

      3.1MB

    • MD5

      0442b0b1f1c66652b51811b11f893ba0

    • SHA1

      9f71af6425b4e31059c52bff56f5bbcb4b3d7957

    • SHA256

      72900e3e5a2105b1c8420c343d6ff4348805969af8802aee60e40b29d23676ba

    • SHA512

      e134f21e7b4b86cdf37e7adb2862b7b0ce9fcb57e267420dfecf5570984911d3ccc930e47e80585cf361e3f15e4092dd6e3371509aa2046a276f604d18414c14

    • SSDEEP

      98304:AAcRTd/kggQSwydThBmnXodHG+z92I0xkZV8zDzSCG:aRTFkg3SwyhsXoRG+zAkZCzDz/G

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks