opera.exe
- File Path:
C:\Program Files\Opera\70.0.3728.106\opera.exe
- Description: Opera Internet Browser
Screenshot
Hashes
Type | Hash |
---|---|
MD5 | C3365FF810311F43C51189D1F646D420 |
SHA1 | C81DC5FD5ECFEA2B3FD68978F79E8B6A27D777A1 |
SHA256 | E8CBF7487B32541CAC4B87D870C13320A3D0D954C40F4777C397B960BE690174 |
SHA384 | 261DE0026F6E63386A43D385A956F67206AC8A56461CA0D959016ADCEF7CD399B24A0DFCD22105D25702C5A67B81A2EE |
SHA512 | F6689D71661A26E7DBC7B7E264C52780ECFB4143617C1D7CA8F247EBA7F14261761F1C43D27692E848C03A5F9F177AF2F7550CF984EE60F858C26A6FAA7D7986 |
SSDEEP | 12288:5vwkvP/aNl347aOSvtpYb1jyUPqfM0RcNZrfAhvGOwHceR5+n3coXCC7F:5PaNt2aOSvjOj6fM4hv8qcmn7F |
Runtime Data
Usage (stdout):
Opera 70.0.3728.106 Stable
Features available through command-line switches:
--with-feature:enhanced-address-bar [Enabled by default: false]
--with-feature:handle-abp-protocol [Enabled by default: true]
--with-feature:history-onboarding [Enabled by default: false]
--with-feature:instagram-panel [Enabled by default: true]
--with-feature:lookalike-url-navigation-suggestions [Enabled by default: true]
--with-feature:procedural-tab-drawing [Enabled by default: true]
--with-feature:search-in-closed-tabs [Enabled by default: true]
--with-feature:search-text-in-tabs [Enabled by default: true]
--with-feature:shared-start-page [Enabled by default: true]
--with-feature:sidebar-site-panel [Enabled by default: false]
--with-feature:smart-files [Enabled by default: false]
--with-feature:suggestion-scoring-improved [Enabled by default: true]
--with-feature:sync-passphrase-papercuts [Enabled by default: true]
--with-feature:weather-on-startpage [Enabled by default: true]
--with-feature:workspaces [Enabled by default: true]
--with-feature:workspaces-bookmark-context-menu [Enabled by default: true]
--with-feature:workspaces-extended-menu [Enabled by default: false]
--with-feature:workspaces-sidebar-context-menu [Enabled by default: true]
--with-feature:workspaces-sidebar-notification [Enabled by default: true]
--with-feature:workspaces-dnd [Enabled by default: false]
--with-feature:yandex-zen-news [Enabled by default: false]
Press any key to continue . . .
Child Processes:
launcher.exe
Signature
- Status: Signature verified.
- Serial:
0D31C23EB2249CE611B953FB16EA0D25
- Thumbprint:
373CD800B048D39CE2057A09937093EA73BCDE5F
- Issuer: CN=DigiCert EV Code Signing CA (SHA2), OU=www.digicert.com, O=DigiCert Inc, C=US
- Subject: CN=Opera Software AS, O=Opera Software AS, L=Oslo, C=NO, SERIALNUMBER=916 368 127, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=NO
File Metadata
- Original Filename:
- Product Name: Opera Internet Browser
- Company Name: Opera Software
- File Version: 70.0.3728.106
- Product Version: 70.0.3728.106
- Language: English (United States)
- Legal Copyright: Copyright Opera Software 2020
File Similarity (ssdeep match)
File | Score |
---|---|
C:\program files\Opera\70.0.3728.133\opera.exe | 96 |
Possible Misuse
The following table contains possible examples of opera.exe
being misused. While opera.exe
is not inherently malicious, its legitimate functionality can be abused for malicious purposes.
Source | Source File | Example | License |
---|---|---|---|
sigma | proxy_ua_malware.yml | - 'Opera/8.81 (Windows NT 6.0; U; en)' # Sality |
DRL 1.0 |
sigma | proxy_ua_malware.yml | - 'Opera' # Trojan Keragany |
DRL 1.0 |
sigma | win_suspicious_outbound_kerberos_connection.yml | - '\opera.exe' |
DRL 1.0 |
sigma | dns_query_win_susp_ipify.yml | - \opera.exe |
DRL 1.0 |
sigma | file_event_win_mal_vhd_download.yml | - opera.exe |
DRL 1.0 |
sigma | net_connection_win_suspicious_outbound_kerberos_connection.yml | - '\opera.exe' |
DRL 1.0 |
sigma | posh_ps_access_to_browser_login_data.yml | - '\Opera Software\Opera Stable\Login Data' |
DRL 1.0 |
sigma | proc_creation_win_apt_hafnium.yml | Image\|endswith: 'Users\Public\opera\Opera_browser.exe' |
DRL 1.0 |
sigma | registry_event_asep_reg_keys_modification_currentversion.yml | TargetObject\|endswith: '\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Opera Browser Assistant' |
DRL 1.0 |
sigma | registry_event_asep_reg_keys_modification_currentversion.yml | Details: 'C:\Program Files\Opera\assistant\browser_assistant.exe' |
DRL 1.0 |
sigma | registry_event_taskcache_entry.yml | - '\TaskCache\Tree\Opera scheduled Autoupdate' |
DRL 1.0 |
sigma | registry_event_taskcache_entry.yml | - '\TaskCache\Tree\Opera scheduled assistant Autoupdate' |
DRL 1.0 |
sigma | sysmon_process_hollowing.yml | - '\opera.exe' |
DRL 1.0 |
malware-ioc | exchange_exploitation | \| 02886f9daa13f7d9855855048c54f1d6b1231b0a\|Win32/Agent.ACUQ \|Opera Cobalt Strike loader |
© ESET 2014-2018 |
malware-ioc | exchange_exploitation | \| 86.105.18[.]116 \|“Opera Cobalt Strike” C&C & distribution server |
© ESET 2014-2018 |
malware-ioc | exchange_exploitation | \| 89.34.111[.]11 \|“Opera Cobalt Strike” distribution server |
© ESET 2014-2018 |
malware-ioc | nouns.txt | opera |
© ESET 2014-2018 |
atomic-red-team | index.md | - Atomic Test #5: Simulating access to Opera Login Data [windows] | MIT License. © 2018 Red Canary |
atomic-red-team | index.md | - Atomic Test #4: List Google Chrome / Opera Bookmarks on Windows with powershell [windows] | MIT License. © 2018 Red Canary |
atomic-red-team | windows-index.md | - Atomic Test #5: Simulating access to Opera Login Data [windows] | MIT License. © 2018 Red Canary |
atomic-red-team | windows-index.md | - Atomic Test #4: List Google Chrome / Opera Bookmarks on Windows with powershell [windows] | MIT License. © 2018 Red Canary |
atomic-red-team | T1071.001.md | Invoke-WebRequest #{domain} -UserAgent “Opera/8.81 (Windows NT 6.0; U; en)” | out-null | MIT License. © 2018 Red Canary |
atomic-red-team | T1071.001.md | #{curl_path} -s -A “Opera/8.81 (Windows NT 6.0; U; en)” -m3 #{domain} >nul 2>&1 | MIT License. © 2018 Red Canary |
atomic-red-team | T1071.001.md | curl -s -A “Opera/8.81 (Windows NT 6.0; U; en)” -m3 #{domain} | MIT License. © 2018 Red Canary |
atomic-red-team | T1217.md | - Atomic Test #4 - List Google Chrome / Opera Bookmarks on Windows with powershell | MIT License. © 2018 Red Canary |
atomic-red-team | T1217.md | ## Atomic Test #4 - List Google Chrome / Opera Bookmarks on Windows with powershell | MIT License. © 2018 Red Canary |
atomic-red-team | T1217.md | Searches for Google Chrome’s and Opera’s Bookmarks file (on Windows distributions) that contains bookmarks. | MIT License. © 2018 Red Canary |
atomic-red-team | T1555.003.md | - Atomic Test #5 - Simulating access to Opera Login Data | MIT License. © 2018 Red Canary |
atomic-red-team | T1555.003.md | ## Atomic Test #5 - Simulating access to Opera Login Data | MIT License. © 2018 Red Canary |
atomic-red-team | T1555.003.md | Simulates an adversary accessing encrypted credentials from Opera web browser’s login database. | MIT License. © 2018 Red Canary |
atomic-red-team | T1555.003.md | Copy-Item “$env:APPDATA\Opera Software\Opera Stable\Login Data” -Destination $env:temp | MIT License. © 2018 Red Canary |
atomic-red-team | T1555.003.md | ##### Description: Opera must be installed | MIT License. © 2018 Red Canary |
atomic-red-team | T1555.003.md | if (((Test-Path “$env:LOCALAPPDATA\Programs\Opera\launcher.exe”) -Or (Test-Path “C:\Program Files\Opera\launcher.exe”) -Or (Test-Path “C:\Program Files (x86)\Opera\launcher.exe”))) {exit 0} else {exit 1} | MIT License. © 2018 Red Canary |
atomic-red-team | T1555.003.md | Invoke-WebRequest -OutFile $env:temp\OperaStandaloneInstaller.exe https://get.geo.opera.com/pub/opera/desktop/82.0.4227.43/win/Opera_82.0.4227.43_Setup.exe | MIT License. © 2018 Red Canary |
atomic-red-team | T1555.003.md | Stop-Process -Name “opera” | MIT License. © 2018 Red Canary |
atomic-red-team | T1555.003.md | ##### Description: Opera login data file must exist | MIT License. © 2018 Red Canary |
atomic-red-team | T1555.003.md | if (Test-Path “$env:APPDATA\Opera Software\Opera Stable\Login Data”) {exit 0} else {exit 1} | MIT License. © 2018 Red Canary |
atomic-red-team | T1555.003.md | New-Item -Path “$env:APPDATA\Opera Software\Opera Stable\Login Data” -ItemType File | MIT License. © 2018 Red Canary |
signature-base | apt_apt30_backspace.yar | $s2 = “Opera.exe” fullword wide | CC BY-NC 4.0 |
signature-base | apt_apt30_backspace.yar | $s6 = “Copyright Opera Software 1995-“ fullword wide | CC BY-NC 4.0 |
signature-base | apt_apt30_backspace.yar | $s9 = “Opera Internet Browser” fullword wide | CC BY-NC 4.0 |
signature-base | apt_apt30_backspace.yar | $s12 = “Opera Software” fullword wide | CC BY-NC 4.0 |
signature-base | apt_buckeye.yar | $s1 = “Opera Software\Opera Stable\Login Data” fullword wide | CC BY-NC 4.0 |
signature-base | apt_dragonfly.yar | $s1 = “\AppData\Roaming\Opera Software\Opera Stable\Login Data” fullword wide | CC BY-NC 4.0 |
signature-base | apt_dragonfly.yar | $s5 = “******** Opera ***********” fullword wide | CC BY-NC 4.0 |
signature-base | apt_telebots.yar | $s6 = “Opera old version credentials” fullword wide | CC BY-NC 4.0 |
signature-base | crime_credstealer_generic.yar | $s3 = “%s\Opera Software\Opera Stable\Login Data” fullword ascii | CC BY-NC 4.0 |
signature-base | crime_credstealer_generic.yar | $s10 = “%s\Opera\Opera\profile\wand.dat” fullword ascii | CC BY-NC 4.0 |
signature-base | crime_envrial.yar | $a1 = “\Opera Software\Opera Stable\Login Data” fullword wide | CC BY-NC 4.0 |
signature-base | crime_ransom_ragna_locker.yar | $s3 = “Opera Software” fullword wide /* Don’t touch browsers for contact him*/ | CC BY-NC 4.0 |
signature-base | crime_socgholish.yar | $a3 = “Opera” ascii | CC BY-NC 4.0 |
signature-base | general_cloaking.yar | and not filepath contains “Opera” | CC BY-NC 4.0 |
signature-base | thor-hacktools.yar | $s1 = “softwares.opera(“ fullword ascii | CC BY-NC 4.0 |
MIT License. Copyright (c) 2020-2021 Strontic.