General

  • Target

    DupeRobux.exe

  • Size

    57KB

  • Sample

    240910-skcr9szbjn

  • MD5

    c870b1f3b3cf0d17f9c88655e65bcc64

  • SHA1

    d8bd42eb5d6cb916cc1d0c4c42efc638b4047094

  • SHA256

    34dd8e8bbf48f42744c0f18a53dd494cd383ae6b7f85b89cda97a788955c3531

  • SHA512

    dccbe647e30e3c0c946b60ac2070dba4a20595510b22b1c03cfb555aa36314c17d0de147bdf72ddb5dd2974f09412866ce4adec361a675f16dd9df136c4d1a1d

  • SSDEEP

    768:Qx6mRbM5xKw0nrDtfPTsOZn3X9LYRaUhehM78wOcOkPsgXDkO:Q1RbS0rD1PTsOZdLMeSAd63

Malware Config

Targets

    • Target

      DupeRobux.exe

    • Size

      57KB

    • MD5

      c870b1f3b3cf0d17f9c88655e65bcc64

    • SHA1

      d8bd42eb5d6cb916cc1d0c4c42efc638b4047094

    • SHA256

      34dd8e8bbf48f42744c0f18a53dd494cd383ae6b7f85b89cda97a788955c3531

    • SHA512

      dccbe647e30e3c0c946b60ac2070dba4a20595510b22b1c03cfb555aa36314c17d0de147bdf72ddb5dd2974f09412866ce4adec361a675f16dd9df136c4d1a1d

    • SSDEEP

      768:Qx6mRbM5xKw0nrDtfPTsOZn3X9LYRaUhehM78wOcOkPsgXDkO:Q1RbS0rD1PTsOZdLMeSAd63

    • Zingo stealer

      Zingo is an info stealer first seen in March 2022.

    • Zingo stealer payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks