General
-
Target
Creal.exe
-
Size
16.0MB
-
Sample
231221-mg2z4agehm
-
MD5
27e097ce4a770194d620d2810246b2a7
-
SHA1
03acbcb25d9c0629f4abe9f67482a5bfecd905ee
-
SHA256
c69d22c654514be0a4446ad0f808bb14767dc0782182c783bab84afda51857a6
-
SHA512
d926d3431a92de674823c00a9cb46bdc924955d9c4b53dd34b564ee13e24f860122372ba6330e1cecf9852ee9be0d8c3e432f6541a14024f2534fdcccf517f01
-
SSDEEP
393216:biIE7YoSD2ntpUTLfhJsW+eGQRCMTozGxu8C0ibfz6e57N1bmXdWCUI:I7rSDaHUTLJSW+e5RLoztZ026e53kVUI
Malware Config
Targets
-
-
Target
Creal.exe
-
Size
16.0MB
-
MD5
27e097ce4a770194d620d2810246b2a7
-
SHA1
03acbcb25d9c0629f4abe9f67482a5bfecd905ee
-
SHA256
c69d22c654514be0a4446ad0f808bb14767dc0782182c783bab84afda51857a6
-
SHA512
d926d3431a92de674823c00a9cb46bdc924955d9c4b53dd34b564ee13e24f860122372ba6330e1cecf9852ee9be0d8c3e432f6541a14024f2534fdcccf517f01
-
SSDEEP
393216:biIE7YoSD2ntpUTLfhJsW+eGQRCMTozGxu8C0ibfz6e57N1bmXdWCUI:I7rSDaHUTLJSW+e5RLoztZ026e53kVUI
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-