General
-
Target
769e759ab44a310c6b44f1da3a5f895cab0e33f7bccd1428d09f344587eaec48
-
Size
184KB
-
Sample
220504-pqmmwagden
-
MD5
03bc0abedf428f004fb59b738d2c2923
-
SHA1
f2e1f9a0eabb21c4287114ef4062cb3389cce2c8
-
SHA256
769e759ab44a310c6b44f1da3a5f895cab0e33f7bccd1428d09f344587eaec48
-
SHA512
cb1344fbc66d84e467bb16f41f7a41c55130e51be4a642364376b28139170234a3ec46cb84eedbf7b5a0fb3adc4191f536ae8f0c05598be4aac0cd4aaa25e372
Static task
static1
Malware Config
Targets
-
-
Target
769e759ab44a310c6b44f1da3a5f895cab0e33f7bccd1428d09f344587eaec48
-
Size
184KB
-
MD5
03bc0abedf428f004fb59b738d2c2923
-
SHA1
f2e1f9a0eabb21c4287114ef4062cb3389cce2c8
-
SHA256
769e759ab44a310c6b44f1da3a5f895cab0e33f7bccd1428d09f344587eaec48
-
SHA512
cb1344fbc66d84e467bb16f41f7a41c55130e51be4a642364376b28139170234a3ec46cb84eedbf7b5a0fb3adc4191f536ae8f0c05598be4aac0cd4aaa25e372
-
suricata: ET MALWARE Observed Zingo/GinzoStealer CnC Domain (nominally .ru in TLS SNI)
suricata: ET MALWARE Observed Zingo/GinzoStealer CnC Domain (nominally .ru in TLS SNI)
-
XMRig Miner Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Possible privilege escalation attempt
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Modifies file permissions
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-