Resubmissions

10/10/2024, 16:18

241010-tr5x3avbrc 10

10/10/2024, 16:17

241010-trhsjavbnh 7

General

  • Target

    OperaSetup.bat

  • Size

    2.1MB

  • Sample

    241010-tr5x3avbrc

  • MD5

    46252fe1a6423fbbd272b168d98c00ba

  • SHA1

    fd4ede984fea0e0a15f1b03ec1ee7aa7393903cd

  • SHA256

    dc074ad6fcb6a29b76b8da45c84ecb811c3ddcd662d93ec69f0929578c267383

  • SHA512

    ac68428d96d606d87d83f22e31585d3944e83f7cf90a101d685867970d2a6a6df54e6f84daffafb04e7f38bfeb61001291178c30cbfe0ae926995b27045d9592

  • SSDEEP

    49152:RVAbwC95j527tIqUxHzKHhDLsRikQUTsoUq8IcgXzNGLRg9x:3AM7tqxTKHnqsoUq8ajzx

Malware Config

Targets

    • Target

      OperaSetup.bat

    • Size

      2.1MB

    • MD5

      46252fe1a6423fbbd272b168d98c00ba

    • SHA1

      fd4ede984fea0e0a15f1b03ec1ee7aa7393903cd

    • SHA256

      dc074ad6fcb6a29b76b8da45c84ecb811c3ddcd662d93ec69f0929578c267383

    • SHA512

      ac68428d96d606d87d83f22e31585d3944e83f7cf90a101d685867970d2a6a6df54e6f84daffafb04e7f38bfeb61001291178c30cbfe0ae926995b27045d9592

    • SSDEEP

      49152:RVAbwC95j527tIqUxHzKHhDLsRikQUTsoUq8IcgXzNGLRg9x:3AM7tqxTKHnqsoUq8ajzx

    • Modifies WinLogon for persistence

    • UAC bypass

    • Disables RegEdit via registry modification

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks