General

  • Target

    Creal.exe

  • Size

    10.7MB

  • Sample

    231003-zc1bxshd29

  • MD5

    58c1aa7d18894e2762d97f8f2997662d

  • SHA1

    07d9c181bb0e00b7fd2dfc3806941ff2a8daf4ac

  • SHA256

    c358eeda046271b9301c0036ad706a3fdb8d38c7c87d9d50108aa2fa4e301512

  • SHA512

    53200e4a4468fafa9dffbfdee8c96989305e4478e1062d4ae4b669f71744e7f937a526e6b1776e74c156dbe62ce74a55a39ee76d2738b7230f4aa616df8a51ea

  • SSDEEP

    196608:TAHiIE7SRpo8fy7IudQmRJ8dA6lSuqaycBIGpEKo6hTOv+QKfrOs6Telo49vLLj/:UiIE7YofDdQuslSq9foWOv+9frOna59j

Malware Config

Targets

    • Target

      Creal.exe

    • Size

      10.7MB

    • MD5

      58c1aa7d18894e2762d97f8f2997662d

    • SHA1

      07d9c181bb0e00b7fd2dfc3806941ff2a8daf4ac

    • SHA256

      c358eeda046271b9301c0036ad706a3fdb8d38c7c87d9d50108aa2fa4e301512

    • SHA512

      53200e4a4468fafa9dffbfdee8c96989305e4478e1062d4ae4b669f71744e7f937a526e6b1776e74c156dbe62ce74a55a39ee76d2738b7230f4aa616df8a51ea

    • SSDEEP

      196608:TAHiIE7SRpo8fy7IudQmRJ8dA6lSuqaycBIGpEKo6hTOv+QKfrOs6Telo49vLLj/:UiIE7YofDdQuslSq9foWOv+9frOna59j

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks