General
-
Target
241876c671f56d4e0ccf4333735882567ca8dbf73c893bb8ba971d8aaf144407.bin
-
Size
170KB
-
MD5
ffbe42e28872589bf30ee47453cf7317
-
SHA1
a635d9935407edc15fb3c8009a9b0c79eac30349
-
SHA256
241876c671f56d4e0ccf4333735882567ca8dbf73c893bb8ba971d8aaf144407
-
SHA512
1ee2b2613c9ac09ac14f2baeadd726b365d6e3dd678102f3c37057ccd0aadba52417e1a95f2ad1adf5dd15cc613ddfe84b4b2a61fca24113fe96d053bfa9094a
-
SSDEEP
3072:8t65yT29uuZxb6jJqLK/B39FCITOYfc/PmDfMZUzZciGabJ:8+79umbFO/FCITOYfc/PmDfMZUzZciGw
Malware Config
Signatures
-
Zingo family
-
Zingo stealer payload 1 IoCs
Processes:
resource yara_rule sample family_zingo
Files
-
241876c671f56d4e0ccf4333735882567ca8dbf73c893bb8ba971d8aaf144407.bin.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
s[2<Xs Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 122KB - Virtual size: 122KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 836B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ