General

  • Target

    OperaGXSetup.exe

  • Size

    3.1MB

  • Sample

    240909-275w1axckh

  • MD5

    258466d7b906789572c91686b321af7e

  • SHA1

    db3dd33cc79ce372bc849ad5ea975e1f6cfd439c

  • SHA256

    c9f3844c8e48414ae6f118998455caf56cac0fe111f3203cfe09dcd845d6b0cd

  • SHA512

    7e50b7d7b51ef6f08b930511865bc624fd230f8910f2a5154e91e8c9a7187a624282d520ad42715f7bae3273c4b73a27a41d99ec13cf3b59b10139cfba77dde9

  • SSDEEP

    98304:jAJbF/eB26JB6+hafAQ2NFSrsf9qgMsIZ/JUFmRT26:aGpafS0U9q0IFYG

Malware Config

Targets

    • Target

      OperaGXSetup.exe

    • Size

      3.1MB

    • MD5

      258466d7b906789572c91686b321af7e

    • SHA1

      db3dd33cc79ce372bc849ad5ea975e1f6cfd439c

    • SHA256

      c9f3844c8e48414ae6f118998455caf56cac0fe111f3203cfe09dcd845d6b0cd

    • SHA512

      7e50b7d7b51ef6f08b930511865bc624fd230f8910f2a5154e91e8c9a7187a624282d520ad42715f7bae3273c4b73a27a41d99ec13cf3b59b10139cfba77dde9

    • SSDEEP

      98304:jAJbF/eB26JB6+hafAQ2NFSrsf9qgMsIZ/JUFmRT26:aGpafS0U9q0IFYG

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks