General

  • Target

    Creal.exe

  • Size

    14.3MB

  • Sample

    230929-fcjjmafg9x

  • MD5

    ce5a56d20951a3c548e0badeba203929

  • SHA1

    38a469246322a75b4f30c9693b1393d312b8ed7a

  • SHA256

    3286183b007859773a4edafce33b3fd321d737e5cfa23dad04941ac7f5690d5b

  • SHA512

    3d9fe8541f569dc4dd73ba9011e1c1dbaa23962af9eb37d2944c238cdec570927dc30f441df902380404e8a679cf58e8670214ba0bda19aefd3d7e2e7fd26325

  • SSDEEP

    196608:/00sKYu/PaQ+Duvf7ndQmRJ8dA6lSuqaycBIGpEqo6hTOv+QKfwJbEBfOuTvbh/e:GQPndQuslSq9RoWOv+9fgatvkt17

Malware Config

Targets

    • Target

      Creal.exe

    • Size

      14.3MB

    • MD5

      ce5a56d20951a3c548e0badeba203929

    • SHA1

      38a469246322a75b4f30c9693b1393d312b8ed7a

    • SHA256

      3286183b007859773a4edafce33b3fd321d737e5cfa23dad04941ac7f5690d5b

    • SHA512

      3d9fe8541f569dc4dd73ba9011e1c1dbaa23962af9eb37d2944c238cdec570927dc30f441df902380404e8a679cf58e8670214ba0bda19aefd3d7e2e7fd26325

    • SSDEEP

      196608:/00sKYu/PaQ+Duvf7ndQmRJ8dA6lSuqaycBIGpEqo6hTOv+QKfwJbEBfOuTvbh/e:GQPndQuslSq9RoWOv+9fgatvkt17

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks