Resubmissions

14-09-2024 07:11

240914-h1eaxssakl 7

14-09-2024 07:10

240914-hzcqps1hqn 7

14-09-2024 06:55

240914-hp6wss1fkl 8

General

  • Target

    OperaGXSetup.exe

  • Size

    3.1MB

  • Sample

    240914-hp6wss1fkl

  • MD5

    3487ada558b8b296d9d36833d8273123

  • SHA1

    58bce514995aa27bc13c303db7ecf30229d7d4b7

  • SHA256

    f7908f4fca5db961066654736243cf95a31ea41fe28eab5a2c2eaafaa356e88d

  • SHA512

    456c2df36a7c6af710a2f41713ab6dee5a9ebd66c8f6accaa85f6bb884e6fa201cb5d68399328f9211edfab2af4092811fdda744a55d1c5d70a1bb1861c3c3aa

  • SSDEEP

    49152:ONEyYYC1hqiJckG38dBFOhg5/6qF3rjb/h4CNcTCP8xphzSNtOSe+aSt:kEP1y3+0hgh6u/ZcTCP8BzONaSt

Malware Config

Targets

    • Target

      OperaGXSetup.exe

    • Size

      3.1MB

    • MD5

      3487ada558b8b296d9d36833d8273123

    • SHA1

      58bce514995aa27bc13c303db7ecf30229d7d4b7

    • SHA256

      f7908f4fca5db961066654736243cf95a31ea41fe28eab5a2c2eaafaa356e88d

    • SHA512

      456c2df36a7c6af710a2f41713ab6dee5a9ebd66c8f6accaa85f6bb884e6fa201cb5d68399328f9211edfab2af4092811fdda744a55d1c5d70a1bb1861c3c3aa

    • SSDEEP

      49152:ONEyYYC1hqiJckG38dBFOhg5/6qF3rjb/h4CNcTCP8xphzSNtOSe+aSt:kEP1y3+0hgh6u/ZcTCP8BzONaSt

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks