sigma |
proxy_ua_malware.yml |
- 'Opera/8.81 (Windows NT 6.0; U; en)' # Sality |
DRL 1.0 |
sigma |
proxy_ua_malware.yml |
- 'Opera' # Trojan Keragany |
DRL 1.0 |
sigma |
win_suspicious_outbound_kerberos_connection.yml |
- '\opera.exe' |
DRL 1.0 |
sigma |
dns_query_win_susp_ipify.yml |
- \opera.exe |
DRL 1.0 |
sigma |
file_event_win_mal_vhd_download.yml |
- opera.exe |
DRL 1.0 |
sigma |
net_connection_win_suspicious_outbound_kerberos_connection.yml |
- '\opera.exe' |
DRL 1.0 |
sigma |
posh_ps_access_to_browser_login_data.yml |
- '\Opera Software\Opera Stable\Login Data' |
DRL 1.0 |
sigma |
proc_creation_win_apt_hafnium.yml |
Image\|endswith: 'Users\Public\opera\Opera_browser.exe' |
DRL 1.0 |
sigma |
registry_event_asep_reg_keys_modification_currentversion.yml |
TargetObject\|endswith: '\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Opera Browser Assistant' |
DRL 1.0 |
sigma |
registry_event_asep_reg_keys_modification_currentversion.yml |
Details: 'C:\Program Files\Opera\assistant\browser_assistant.exe' |
DRL 1.0 |
sigma |
registry_event_taskcache_entry.yml |
- '\TaskCache\Tree\Opera scheduled Autoupdate' |
DRL 1.0 |
sigma |
registry_event_taskcache_entry.yml |
- '\TaskCache\Tree\Opera scheduled assistant Autoupdate' |
DRL 1.0 |
sigma |
sysmon_process_hollowing.yml |
- '\opera.exe' |
DRL 1.0 |
malware-ioc |
exchange_exploitation |
\| 02886f9daa13f7d9855855048c54f1d6b1231b0a\|Win32/Agent.ACUQ \|Opera Cobalt Strike loader |
© ESET 2014-2018 |
malware-ioc |
exchange_exploitation |
\| 86.105.18[.]116 \|“Opera Cobalt Strike” C&C & distribution server |
© ESET 2014-2018 |
malware-ioc |
exchange_exploitation |
\| 89.34.111[.]11 \|“Opera Cobalt Strike” distribution server |
© ESET 2014-2018 |
malware-ioc |
nouns.txt |
opera |
© ESET 2014-2018 |
atomic-red-team |
index.md |
- Atomic Test #5: Simulating access to Opera Login Data [windows] |
MIT License. © 2018 Red Canary |
atomic-red-team |
index.md |
- Atomic Test #4: List Google Chrome / Opera Bookmarks on Windows with powershell [windows] |
MIT License. © 2018 Red Canary |
atomic-red-team |
windows-index.md |
- Atomic Test #5: Simulating access to Opera Login Data [windows] |
MIT License. © 2018 Red Canary |
atomic-red-team |
windows-index.md |
- Atomic Test #4: List Google Chrome / Opera Bookmarks on Windows with powershell [windows] |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1071.001.md |
Invoke-WebRequest #{domain} -UserAgent “Opera/8.81 (Windows NT 6.0; U; en)” | out-null |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1071.001.md |
#{curl_path} -s -A “Opera/8.81 (Windows NT 6.0; U; en)” -m3 #{domain} >nul 2>&1 |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1071.001.md |
curl -s -A “Opera/8.81 (Windows NT 6.0; U; en)” -m3 #{domain} |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1217.md |
- Atomic Test #4 - List Google Chrome / Opera Bookmarks on Windows with powershell |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1217.md |
## Atomic Test #4 - List Google Chrome / Opera Bookmarks on Windows with powershell |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1217.md |
Searches for Google Chrome’s and Opera’s Bookmarks file (on Windows distributions) that contains bookmarks. |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1555.003.md |
- Atomic Test #5 - Simulating access to Opera Login Data |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1555.003.md |
## Atomic Test #5 - Simulating access to Opera Login Data |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1555.003.md |
Simulates an adversary accessing encrypted credentials from Opera web browser’s login database. |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1555.003.md |
Copy-Item “$env:APPDATA\Opera Software\Opera Stable\Login Data” -Destination $env:temp |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1555.003.md |
##### Description: Opera must be installed |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1555.003.md |
if (((Test-Path “$env:LOCALAPPDATA\Programs\Opera\launcher.exe”) -Or (Test-Path “C:\Program Files\Opera\launcher.exe”) -Or (Test-Path “C:\Program Files (x86)\Opera\launcher.exe”))) {exit 0} else {exit 1} |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1555.003.md |
Invoke-WebRequest -OutFile $env:temp\OperaStandaloneInstaller.exe https://get.geo.opera.com/pub/opera/desktop/82.0.4227.43/win/Opera_82.0.4227.43_Setup.exe |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1555.003.md |
Stop-Process -Name “opera” |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1555.003.md |
##### Description: Opera login data file must exist |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1555.003.md |
if (Test-Path “$env:APPDATA\Opera Software\Opera Stable\Login Data”) {exit 0} else {exit 1} |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1555.003.md |
New-Item -Path “$env:APPDATA\Opera Software\Opera Stable\Login Data” -ItemType File |
MIT License. © 2018 Red Canary |
signature-base |
apt_apt30_backspace.yar |
$s2 = “Opera.exe” fullword wide |
CC BY-NC 4.0 |
signature-base |
apt_apt30_backspace.yar |
$s6 = “Copyright Opera Software 1995-“ fullword wide |
CC BY-NC 4.0 |
signature-base |
apt_apt30_backspace.yar |
$s9 = “Opera Internet Browser” fullword wide |
CC BY-NC 4.0 |
signature-base |
apt_apt30_backspace.yar |
$s12 = “Opera Software” fullword wide |
CC BY-NC 4.0 |
signature-base |
apt_buckeye.yar |
$s1 = “Opera Software\Opera Stable\Login Data” fullword wide |
CC BY-NC 4.0 |
signature-base |
apt_dragonfly.yar |
$s1 = “\AppData\Roaming\Opera Software\Opera Stable\Login Data” fullword wide |
CC BY-NC 4.0 |
signature-base |
apt_dragonfly.yar |
$s5 = “******** Opera ***********” fullword wide |
CC BY-NC 4.0 |
signature-base |
apt_telebots.yar |
$s6 = “Opera old version credentials” fullword wide |
CC BY-NC 4.0 |
signature-base |
crime_credstealer_generic.yar |
$s3 = “%s\Opera Software\Opera Stable\Login Data” fullword ascii |
CC BY-NC 4.0 |
signature-base |
crime_credstealer_generic.yar |
$s10 = “%s\Opera\Opera\profile\wand.dat” fullword ascii |
CC BY-NC 4.0 |
signature-base |
crime_envrial.yar |
$a1 = “\Opera Software\Opera Stable\Login Data” fullword wide |
CC BY-NC 4.0 |
signature-base |
crime_ransom_ragna_locker.yar |
$s3 = “Opera Software” fullword wide /* Don’t touch browsers for contact him*/ |
CC BY-NC 4.0 |
signature-base |
crime_socgholish.yar |
$a3 = “Opera” ascii |
CC BY-NC 4.0 |
signature-base |
general_cloaking.yar |
and not filepath contains “Opera” |
CC BY-NC 4.0 |
signature-base |
thor-hacktools.yar |
$s1 = “softwares.opera(“ fullword ascii |
CC BY-NC 4.0 |