General

  • Target

    9dfef3d3c0b740f2c1604344647af61b3780fba0ba1902df114f4b746fb166b5

  • Size

    54KB

  • Sample

    220930-wfemvafcfk

  • MD5

    b5282d498ca119c35cdbae2d0783dbfd

  • SHA1

    d2acb7d1c31e3035386194c09a56f7e22de162d6

  • SHA256

    9dfef3d3c0b740f2c1604344647af61b3780fba0ba1902df114f4b746fb166b5

  • SHA512

    7ac7758bc08b0f2075a79196ab85df976fa36ed380b0b8f81739005d92a58a91e55ba845337ab08dcf78d05c31735dbb3835549a6c7416e9a523864ab594add3

  • SSDEEP

    768:VzoZgTk0MRUQDbDySGol+1R/8LGRaUh1GM78EEcOwPsiX/z+h:JoZgTPsbDySGol+ELC1NAfG/g

Malware Config

Targets

    • Target

      9dfef3d3c0b740f2c1604344647af61b3780fba0ba1902df114f4b746fb166b5

    • Size

      54KB

    • MD5

      b5282d498ca119c35cdbae2d0783dbfd

    • SHA1

      d2acb7d1c31e3035386194c09a56f7e22de162d6

    • SHA256

      9dfef3d3c0b740f2c1604344647af61b3780fba0ba1902df114f4b746fb166b5

    • SHA512

      7ac7758bc08b0f2075a79196ab85df976fa36ed380b0b8f81739005d92a58a91e55ba845337ab08dcf78d05c31735dbb3835549a6c7416e9a523864ab594add3

    • SSDEEP

      768:VzoZgTk0MRUQDbDySGol+1R/8LGRaUh1GM78EEcOwPsiX/z+h:JoZgTPsbDySGol+ELC1NAfG/g

    • Zingo stealer

      Zingo is an info stealer first seen in March 2022.

    • Zingo stealer payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks