Resubmissions

13/10/2024, 18:49

241013-xgb4sawhjk 8

13/10/2024, 18:44

241013-xdreassalh 8

General

  • Target

    OperaGXSetup (1).exe

  • Size

    3.2MB

  • Sample

    241013-xgb4sawhjk

  • MD5

    03ab9b24d994fc46176776a167e087ec

  • SHA1

    281c9564a9f7b9387b8cd78afe6455db8b2050cf

  • SHA256

    f9db61e24f3797ff523b7aefb01b6e0f52c206d4ea9fbcde8005d83c468a3d25

  • SHA512

    eeccfad1a00a17331a56ad511b1f109317335eb8b9bcaf3245e290ce2e20a631291977d3b8cce22223695c3c630b940d4ffc76d62f1e1cb5868e4f2e5f299976

  • SSDEEP

    98304:qA8nd05UHPD5oiuFSYyzl0sLKpO1fu8eiWO:OHPD5H3hl0sWih3H

Malware Config

Targets

    • Target

      OperaGXSetup (1).exe

    • Size

      3.2MB

    • MD5

      03ab9b24d994fc46176776a167e087ec

    • SHA1

      281c9564a9f7b9387b8cd78afe6455db8b2050cf

    • SHA256

      f9db61e24f3797ff523b7aefb01b6e0f52c206d4ea9fbcde8005d83c468a3d25

    • SHA512

      eeccfad1a00a17331a56ad511b1f109317335eb8b9bcaf3245e290ce2e20a631291977d3b8cce22223695c3c630b940d4ffc76d62f1e1cb5868e4f2e5f299976

    • SSDEEP

      98304:qA8nd05UHPD5oiuFSYyzl0sLKpO1fu8eiWO:OHPD5H3hl0sWih3H

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks