General

  • Target

    Creal_JC.exe

  • Size

    12.0MB

  • Sample

    231025-ygf86seh35

  • MD5

    f54c46ecf68d509b47b11070ec7afffe

  • SHA1

    79e132011aa4b630e1dde94b0c2e5a3aaaa60f85

  • SHA256

    8b6bb53f8f87e5f7ba16e91b3354469ab6530936b3672177450a0b05ddace599

  • SHA512

    76d28e49f5c93acb5e0ed46f0b663e306aaf5ab2fd6e1783b8d6cb40419d7380cf467ee584d604853efacd815cf0a03dd0efb729eb98d6c49253ace8a0d8fbef

  • SSDEEP

    196608:q44RGdM80sKYu/PaQdXGnJ2/NsRHvUWvo3hxqno/w3iFCxa55QbRzXNgzaF00/hq:aUdM2QdXGieRHdcxOo/w3uCxEQb0uF0G

Malware Config

Targets

    • Target

      Creal_JC.exe

    • Size

      12.0MB

    • MD5

      f54c46ecf68d509b47b11070ec7afffe

    • SHA1

      79e132011aa4b630e1dde94b0c2e5a3aaaa60f85

    • SHA256

      8b6bb53f8f87e5f7ba16e91b3354469ab6530936b3672177450a0b05ddace599

    • SHA512

      76d28e49f5c93acb5e0ed46f0b663e306aaf5ab2fd6e1783b8d6cb40419d7380cf467ee584d604853efacd815cf0a03dd0efb729eb98d6c49253ace8a0d8fbef

    • SSDEEP

      196608:q44RGdM80sKYu/PaQdXGnJ2/NsRHvUWvo3hxqno/w3iFCxa55QbRzXNgzaF00/hq:aUdM2QdXGieRHdcxOo/w3uCxEQb0uF0G

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks