General
-
Target
Creal.exe
-
Size
16.9MB
-
Sample
230822-zva5ragh3t
-
MD5
c43ece8537a08cdd41a6ba220d5df517
-
SHA1
d1323d3a382c7d70803737c087e4378251350224
-
SHA256
a30227ac705282ab7f4b59e726cb480ee28af1972ac0dfd8d750786a70b63219
-
SHA512
3063784011076bcba2026368ff8f077e1339694795e7c5783aadc40e2223fc41bc963839f27d13c2ef131dee357fb752e64d2a6662b7d3664f54ba574fdb3b5d
-
SSDEEP
196608:ew0sKYu/PaQts1q4FMIZETSRjPePdrQJM96KbABL9vQ8lc1pd4ilW39Bn4iyH6Rl:7QtswQETSRvJQnEvQ8g0iWNB4pVIT
Behavioral task
behavioral1
Sample
Creal.exe
Resource
win7-20230712-en
Malware Config
Targets
-
-
Target
Creal.exe
-
Size
16.9MB
-
MD5
c43ece8537a08cdd41a6ba220d5df517
-
SHA1
d1323d3a382c7d70803737c087e4378251350224
-
SHA256
a30227ac705282ab7f4b59e726cb480ee28af1972ac0dfd8d750786a70b63219
-
SHA512
3063784011076bcba2026368ff8f077e1339694795e7c5783aadc40e2223fc41bc963839f27d13c2ef131dee357fb752e64d2a6662b7d3664f54ba574fdb3b5d
-
SSDEEP
196608:ew0sKYu/PaQts1q4FMIZETSRjPePdrQJM96KbABL9vQ8lc1pd4ilW39Bn4iyH6Rl:7QtswQETSRvJQnEvQ8g0iWNB4pVIT
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-