General

  • Target

    26bfbc8855b16b3a01602a4653437abfeea4b1d845db2ce2426238e43e30cede

  • Size

    54KB

  • Sample

    221112-rlpyjsgc56

  • MD5

    b99bb4d647042acf8df40704eb1829e5

  • SHA1

    503b6542a412d0a47de32b608aaf399432ff9b3e

  • SHA256

    26bfbc8855b16b3a01602a4653437abfeea4b1d845db2ce2426238e43e30cede

  • SHA512

    60b75db2c9d80e7f0d883203d6a4408d9d044a5ff5517f3e39f2e684db7dd95e5a3736d08760146879a3a1a4ddd9aee7eb0e40c8d79483c5274e53f4c941386a

  • SSDEEP

    768:PzoZgTk0MRUQDbDySGol+1R/8LGRaUh1GM78EocOwPsxX/z+0:roZgTPsbDySGol+ELC1NALp/F

Malware Config

Targets

    • Target

      26bfbc8855b16b3a01602a4653437abfeea4b1d845db2ce2426238e43e30cede

    • Size

      54KB

    • MD5

      b99bb4d647042acf8df40704eb1829e5

    • SHA1

      503b6542a412d0a47de32b608aaf399432ff9b3e

    • SHA256

      26bfbc8855b16b3a01602a4653437abfeea4b1d845db2ce2426238e43e30cede

    • SHA512

      60b75db2c9d80e7f0d883203d6a4408d9d044a5ff5517f3e39f2e684db7dd95e5a3736d08760146879a3a1a4ddd9aee7eb0e40c8d79483c5274e53f4c941386a

    • SSDEEP

      768:PzoZgTk0MRUQDbDySGol+1R/8LGRaUh1GM78EocOwPsxX/z+0:roZgTPsbDySGol+ELC1NALp/F

    • Zingo stealer

      Zingo is an info stealer first seen in March 2022.

    • Zingo stealer payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks