General

  • Target

    Creal.exe

  • Size

    16.9MB

  • Sample

    230822-zva5ragh3t

  • MD5

    c43ece8537a08cdd41a6ba220d5df517

  • SHA1

    d1323d3a382c7d70803737c087e4378251350224

  • SHA256

    a30227ac705282ab7f4b59e726cb480ee28af1972ac0dfd8d750786a70b63219

  • SHA512

    3063784011076bcba2026368ff8f077e1339694795e7c5783aadc40e2223fc41bc963839f27d13c2ef131dee357fb752e64d2a6662b7d3664f54ba574fdb3b5d

  • SSDEEP

    196608:ew0sKYu/PaQts1q4FMIZETSRjPePdrQJM96KbABL9vQ8lc1pd4ilW39Bn4iyH6Rl:7QtswQETSRvJQnEvQ8g0iWNB4pVIT

Malware Config

Targets

    • Target

      Creal.exe

    • Size

      16.9MB

    • MD5

      c43ece8537a08cdd41a6ba220d5df517

    • SHA1

      d1323d3a382c7d70803737c087e4378251350224

    • SHA256

      a30227ac705282ab7f4b59e726cb480ee28af1972ac0dfd8d750786a70b63219

    • SHA512

      3063784011076bcba2026368ff8f077e1339694795e7c5783aadc40e2223fc41bc963839f27d13c2ef131dee357fb752e64d2a6662b7d3664f54ba574fdb3b5d

    • SSDEEP

      196608:ew0sKYu/PaQts1q4FMIZETSRjPePdrQJM96KbABL9vQ8lc1pd4ilW39Bn4iyH6Rl:7QtswQETSRvJQnEvQ8g0iWNB4pVIT

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks