General
-
Target
OperaGXSetup.exe
-
Size
3.1MB
-
Sample
240913-rybaxsvara
-
MD5
ced94adcd39f3f6fee5245c79df492e6
-
SHA1
260cf40e5da44266523e8dd315932f2f3e497ef4
-
SHA256
b0ce56d5762ec06a4252249a3be3873763ecfdc3d86173933bee829389edfefa
-
SHA512
e189b85be92770f9b4c0a67de10c28a27753744e0d009ba6d005b2d014fb605a4e06019370bf6f3acb8a2c7824ef670ee1aef37bec6be1edee532a6b26261812
-
SSDEEP
98304:WAJbF/eB26JB6+hafAQ2NFSrsf9qgMsIZ/JUFmRT22:HGpafS0U9q0IFYK
Static task
static1
Behavioral task
behavioral1
Sample
OperaGXSetup.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
OperaGXSetup.exe
-
Size
3.1MB
-
MD5
ced94adcd39f3f6fee5245c79df492e6
-
SHA1
260cf40e5da44266523e8dd315932f2f3e497ef4
-
SHA256
b0ce56d5762ec06a4252249a3be3873763ecfdc3d86173933bee829389edfefa
-
SHA512
e189b85be92770f9b4c0a67de10c28a27753744e0d009ba6d005b2d014fb605a4e06019370bf6f3acb8a2c7824ef670ee1aef37bec6be1edee532a6b26261812
-
SSDEEP
98304:WAJbF/eB26JB6+hafAQ2NFSrsf9qgMsIZ/JUFmRT22:HGpafS0U9q0IFYK
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1