General
-
Target
Creal.exe
-
Size
18.1MB
-
Sample
231004-w1t82adh3s
-
MD5
22433d7243099e8e5c33eb4b915099cd
-
SHA1
089f409b9da25acf55b94fef4e19535529ba872d
-
SHA256
38da212dcc6fe50023ce87fc64067129766f509c664a354994690e4a1f1dc395
-
SHA512
954e8bbc8088ed745b8a15a7c4683faf6848886970ffb46d26f8d3563e9c2602cd40b86b83f1a489db69aa60d42da96c45642d1ad1938cf15b39b84ff72edca6
-
SSDEEP
393216:EiIE7YoPQtsTTGRk3meBcGfd0vYM0lkWR6oCvdSsu:d7rPQts/GRaT5F0vYFlHx
Behavioral task
behavioral1
Sample
Creal.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
Creal.exe
-
Size
18.1MB
-
MD5
22433d7243099e8e5c33eb4b915099cd
-
SHA1
089f409b9da25acf55b94fef4e19535529ba872d
-
SHA256
38da212dcc6fe50023ce87fc64067129766f509c664a354994690e4a1f1dc395
-
SHA512
954e8bbc8088ed745b8a15a7c4683faf6848886970ffb46d26f8d3563e9c2602cd40b86b83f1a489db69aa60d42da96c45642d1ad1938cf15b39b84ff72edca6
-
SSDEEP
393216:EiIE7YoPQtsTTGRk3meBcGfd0vYM0lkWR6oCvdSsu:d7rPQts/GRaT5F0vYFlHx
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-