General
-
Target
Creal.exe
-
Size
10.7MB
-
Sample
231003-zc1bxshd29
-
MD5
58c1aa7d18894e2762d97f8f2997662d
-
SHA1
07d9c181bb0e00b7fd2dfc3806941ff2a8daf4ac
-
SHA256
c358eeda046271b9301c0036ad706a3fdb8d38c7c87d9d50108aa2fa4e301512
-
SHA512
53200e4a4468fafa9dffbfdee8c96989305e4478e1062d4ae4b669f71744e7f937a526e6b1776e74c156dbe62ce74a55a39ee76d2738b7230f4aa616df8a51ea
-
SSDEEP
196608:TAHiIE7SRpo8fy7IudQmRJ8dA6lSuqaycBIGpEKo6hTOv+QKfrOs6Telo49vLLj/:UiIE7YofDdQuslSq9foWOv+9frOna59j
Behavioral task
behavioral1
Sample
Creal.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
Creal.exe
-
Size
10.7MB
-
MD5
58c1aa7d18894e2762d97f8f2997662d
-
SHA1
07d9c181bb0e00b7fd2dfc3806941ff2a8daf4ac
-
SHA256
c358eeda046271b9301c0036ad706a3fdb8d38c7c87d9d50108aa2fa4e301512
-
SHA512
53200e4a4468fafa9dffbfdee8c96989305e4478e1062d4ae4b669f71744e7f937a526e6b1776e74c156dbe62ce74a55a39ee76d2738b7230f4aa616df8a51ea
-
SSDEEP
196608:TAHiIE7SRpo8fy7IudQmRJ8dA6lSuqaycBIGpEKo6hTOv+QKfrOs6Telo49vLLj/:UiIE7YofDdQuslSq9foWOv+9frOna59j
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-