General

  • Target

    Creal.exe

  • Size

    13.2MB

  • Sample

    231223-gf21taedak

  • MD5

    de187ac32be313bf36fd97135dc80ce0

  • SHA1

    499f8136aa1ce67869fc2be3e2092d5f73647518

  • SHA256

    3ef518f035a525cd9d5f788ab9c99defe644be284bb8d4dce5e01d518273d7dd

  • SHA512

    a356d505ea9c1f4dda6d65fad65afed9438b83a45e1a4820b6539f40e2c4255a01da34d7f60f2068c05f4d554f80b9ad3808c0b6117d0fb0d090e0fa7e343dd7

  • SSDEEP

    393216:6iIE7YoSD2nwW+eGQRIMTozGxu8C0ibfz6e57Z1bmXdWCUI:j7rSDawW+e5R5oztZ026e5DkVUI

Malware Config

Targets

    • Target

      Creal.exe

    • Size

      13.2MB

    • MD5

      de187ac32be313bf36fd97135dc80ce0

    • SHA1

      499f8136aa1ce67869fc2be3e2092d5f73647518

    • SHA256

      3ef518f035a525cd9d5f788ab9c99defe644be284bb8d4dce5e01d518273d7dd

    • SHA512

      a356d505ea9c1f4dda6d65fad65afed9438b83a45e1a4820b6539f40e2c4255a01da34d7f60f2068c05f4d554f80b9ad3808c0b6117d0fb0d090e0fa7e343dd7

    • SSDEEP

      393216:6iIE7YoSD2nwW+eGQRIMTozGxu8C0ibfz6e57Z1bmXdWCUI:j7rSDawW+e5R5oztZ026e5DkVUI

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks