General

  • Target

    OperaGXSetup.exe

  • Size

    3.1MB

  • Sample

    241002-3k79aashlj

  • MD5

    fffe19a9b8a97bd06c8a1d36752241e0

  • SHA1

    13cdd70c3b5475674fe769d3041cab4fbbc9966f

  • SHA256

    3ec54ab37d2b2a0b2182a99a6e7988fe992f04bdf506f51106ac59e6a538652a

  • SHA512

    22c33782078f22d0efdb9e677784bf1d85e6de1785145a33754e6a78137f77c0d0f659630ac98c9b68e7cdbb9c5de78a0f0b1cb1523f17ff78a30c8adec04e68

  • SSDEEP

    98304:yAvAd9yGp338SUPNvuldZzOKsGU0DAo8In+aM:TFG18rNmldrsn0Zj+aM

Malware Config

Targets

    • Target

      OperaGXSetup.exe

    • Size

      3.1MB

    • MD5

      fffe19a9b8a97bd06c8a1d36752241e0

    • SHA1

      13cdd70c3b5475674fe769d3041cab4fbbc9966f

    • SHA256

      3ec54ab37d2b2a0b2182a99a6e7988fe992f04bdf506f51106ac59e6a538652a

    • SHA512

      22c33782078f22d0efdb9e677784bf1d85e6de1785145a33754e6a78137f77c0d0f659630ac98c9b68e7cdbb9c5de78a0f0b1cb1523f17ff78a30c8adec04e68

    • SSDEEP

      98304:yAvAd9yGp338SUPNvuldZzOKsGU0DAo8In+aM:TFG18rNmldrsn0Zj+aM

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks