Ginzo.pdb
Behavioral task
behavioral1
Sample
020dc6c59f7a264add5d9ce114eaad07787fb1f7f256dfc91c8291f7445859f2.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
020dc6c59f7a264add5d9ce114eaad07787fb1f7f256dfc91c8291f7445859f2.exe
Resource
win10v2004-20240709-en
General
-
Target
020dc6c59f7a264add5d9ce114eaad07787fb1f7f256dfc91c8291f7445859f2.exe
-
Size
202KB
-
MD5
464890b82e7bf5f663f098dd5af2efe4
-
SHA1
f9d150c6d554dd73219936f51eecbf963b371e19
-
SHA256
020dc6c59f7a264add5d9ce114eaad07787fb1f7f256dfc91c8291f7445859f2
-
SHA512
517fbd2dff7cbbebd3740b6b173f179d46723f23e6ee8a0c9de3c5d9f61383783e9af792cc0bf226977bd9a97fb5d7d58c69ab884e045daf31228d945e7032bd
-
SSDEEP
6144:wQR8fuL5BIaI5Y+At0ZcXQ0/E9eZfleAmGXJhlcss9UD:w5wWnAt0ZcXQ0/E9eZfleAmGXJhlcss2
Malware Config
Signatures
-
Zingo family
-
Zingo stealer payload 1 IoCs
Processes:
resource yara_rule sample family_zingo -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 020dc6c59f7a264add5d9ce114eaad07787fb1f7f256dfc91c8291f7445859f2.exe
Files
-
020dc6c59f7a264add5d9ce114eaad07787fb1f7f256dfc91c8291f7445859f2.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
7N!,<k Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 131KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 836B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
��s�u� Size: 16KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE