General
-
Target
DupeRobux.exe
-
Size
57KB
-
Sample
240910-skcr9szbjn
-
MD5
c870b1f3b3cf0d17f9c88655e65bcc64
-
SHA1
d8bd42eb5d6cb916cc1d0c4c42efc638b4047094
-
SHA256
34dd8e8bbf48f42744c0f18a53dd494cd383ae6b7f85b89cda97a788955c3531
-
SHA512
dccbe647e30e3c0c946b60ac2070dba4a20595510b22b1c03cfb555aa36314c17d0de147bdf72ddb5dd2974f09412866ce4adec361a675f16dd9df136c4d1a1d
-
SSDEEP
768:Qx6mRbM5xKw0nrDtfPTsOZn3X9LYRaUhehM78wOcOkPsgXDkO:Q1RbS0rD1PTsOZdLMeSAd63
Behavioral task
behavioral1
Sample
DupeRobux.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
DupeRobux.exe
-
Size
57KB
-
MD5
c870b1f3b3cf0d17f9c88655e65bcc64
-
SHA1
d8bd42eb5d6cb916cc1d0c4c42efc638b4047094
-
SHA256
34dd8e8bbf48f42744c0f18a53dd494cd383ae6b7f85b89cda97a788955c3531
-
SHA512
dccbe647e30e3c0c946b60ac2070dba4a20595510b22b1c03cfb555aa36314c17d0de147bdf72ddb5dd2974f09412866ce4adec361a675f16dd9df136c4d1a1d
-
SSDEEP
768:Qx6mRbM5xKw0nrDtfPTsOZn3X9LYRaUhehM78wOcOkPsgXDkO:Q1RbS0rD1PTsOZdLMeSAd63
-
Zingo stealer payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-