General

  • Target

    OperaGXSetup (1).exe

  • Size

    3.1MB

  • Sample

    240928-jfz8bswfpf

  • MD5

    5dbd7b34b8160c3f36a6281706b7d2bb

  • SHA1

    da14d8ca141c4c6538848b79d42d94809b225e86

  • SHA256

    e45e1924154230dc83712e58e29568a1693c0f741ff77ccd28c19f14f5581a47

  • SHA512

    2a73fa6e330746312e0e5b112f866d0f4db5610a006317bf965e098684f62fc227dba39a1d49647887668860c1e2db778a6703b4e41e442d231b4f17e9a28ee2

  • SSDEEP

    98304:YAvAd9yGp338SUPNvuldZzOKsGU0DAo8In+aj:FFG18rNmldrsn0Zj+aj

Malware Config

Targets

    • Target

      OperaGXSetup (1).exe

    • Size

      3.1MB

    • MD5

      5dbd7b34b8160c3f36a6281706b7d2bb

    • SHA1

      da14d8ca141c4c6538848b79d42d94809b225e86

    • SHA256

      e45e1924154230dc83712e58e29568a1693c0f741ff77ccd28c19f14f5581a47

    • SHA512

      2a73fa6e330746312e0e5b112f866d0f4db5610a006317bf965e098684f62fc227dba39a1d49647887668860c1e2db778a6703b4e41e442d231b4f17e9a28ee2

    • SSDEEP

      98304:YAvAd9yGp338SUPNvuldZzOKsGU0DAo8In+aj:FFG18rNmldrsn0Zj+aj

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks