General

  • Target

    29aaf169fc8fe3719d8eceb3d587f2579c3605e9d27c8be7ccdc1801c2c706cf.exe

  • Size

    54KB

  • Sample

    240113-y3m9lsefa4

  • MD5

    c6806f311680863fdfb09a32a26b7433

  • SHA1

    d0821dd151f4ea3d28b40429c5f43f9dcdf45c48

  • SHA256

    29aaf169fc8fe3719d8eceb3d587f2579c3605e9d27c8be7ccdc1801c2c706cf

  • SHA512

    71eaa094129e82e1d7680b7d7ce6da1a1932df949c23e03ebe2d3edb719454b577d9a94a7fc9871ba1bc889a63f9f5ef8bdaed1d27d9a57c26d055fd30d5538e

  • SSDEEP

    768:MzoZgTk0MRUQDbDySGol+1R/8LGRaUh1GM78EAcOwPsiX/z+vB:ioZgTPsbDySGol+ELC1NA7m/8

Malware Config

Targets

    • Target

      29aaf169fc8fe3719d8eceb3d587f2579c3605e9d27c8be7ccdc1801c2c706cf.exe

    • Size

      54KB

    • MD5

      c6806f311680863fdfb09a32a26b7433

    • SHA1

      d0821dd151f4ea3d28b40429c5f43f9dcdf45c48

    • SHA256

      29aaf169fc8fe3719d8eceb3d587f2579c3605e9d27c8be7ccdc1801c2c706cf

    • SHA512

      71eaa094129e82e1d7680b7d7ce6da1a1932df949c23e03ebe2d3edb719454b577d9a94a7fc9871ba1bc889a63f9f5ef8bdaed1d27d9a57c26d055fd30d5538e

    • SSDEEP

      768:MzoZgTk0MRUQDbDySGol+1R/8LGRaUh1GM78EAcOwPsiX/z+vB:ioZgTPsbDySGol+ELC1NA7m/8

    • Zingo stealer

      Zingo is an info stealer first seen in March 2022.

    • Zingo stealer payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks