General
-
Target
9dfef3d3c0b740f2c1604344647af61b3780fba0ba1902df114f4b746fb166b5
-
Size
54KB
-
Sample
220930-wfemvafcfk
-
MD5
b5282d498ca119c35cdbae2d0783dbfd
-
SHA1
d2acb7d1c31e3035386194c09a56f7e22de162d6
-
SHA256
9dfef3d3c0b740f2c1604344647af61b3780fba0ba1902df114f4b746fb166b5
-
SHA512
7ac7758bc08b0f2075a79196ab85df976fa36ed380b0b8f81739005d92a58a91e55ba845337ab08dcf78d05c31735dbb3835549a6c7416e9a523864ab594add3
-
SSDEEP
768:VzoZgTk0MRUQDbDySGol+1R/8LGRaUh1GM78EEcOwPsiX/z+h:JoZgTPsbDySGol+ELC1NAfG/g
Behavioral task
behavioral1
Sample
9dfef3d3c0b740f2c1604344647af61b3780fba0ba1902df114f4b746fb166b5.exe
Resource
win7-20220812-en
Malware Config
Targets
-
-
Target
9dfef3d3c0b740f2c1604344647af61b3780fba0ba1902df114f4b746fb166b5
-
Size
54KB
-
MD5
b5282d498ca119c35cdbae2d0783dbfd
-
SHA1
d2acb7d1c31e3035386194c09a56f7e22de162d6
-
SHA256
9dfef3d3c0b740f2c1604344647af61b3780fba0ba1902df114f4b746fb166b5
-
SHA512
7ac7758bc08b0f2075a79196ab85df976fa36ed380b0b8f81739005d92a58a91e55ba845337ab08dcf78d05c31735dbb3835549a6c7416e9a523864ab594add3
-
SSDEEP
768:VzoZgTk0MRUQDbDySGol+1R/8LGRaUh1GM78EEcOwPsiX/z+h:JoZgTPsbDySGol+ELC1NAfG/g
-
Zingo stealer payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-