General

  • Target

    Creal.exe

  • Size

    7.2MB

  • Sample

    240105-1zfrgacff3

  • MD5

    7e588baa61473b65785f3a5d06ce7405

  • SHA1

    87984d1d3fd3bcabaab58cabb9a58a64b9407dce

  • SHA256

    ae4471b251799f00b46508e52475758f6ea3d8341a00cfd34a3da60913081272

  • SHA512

    2c7cbbf05b498c64d81d840732a0df993aec163c8a4f71cb5f3e40c083416a38c8fe7b5d2c37014f68bf9594759ca57e2ab86de29d2325ae7b4007562b455709

  • SSDEEP

    196608:8CT+aj1rpnrJehwiIbZg4TIdQNm5XKCt7oQqLJad0+:8CT+aoqbCdQyftlqLJad0+

Malware Config

Targets

    • Target

      Creal.exe

    • Size

      7.2MB

    • MD5

      7e588baa61473b65785f3a5d06ce7405

    • SHA1

      87984d1d3fd3bcabaab58cabb9a58a64b9407dce

    • SHA256

      ae4471b251799f00b46508e52475758f6ea3d8341a00cfd34a3da60913081272

    • SHA512

      2c7cbbf05b498c64d81d840732a0df993aec163c8a4f71cb5f3e40c083416a38c8fe7b5d2c37014f68bf9594759ca57e2ab86de29d2325ae7b4007562b455709

    • SSDEEP

      196608:8CT+aj1rpnrJehwiIbZg4TIdQNm5XKCt7oQqLJad0+:8CT+aoqbCdQyftlqLJad0+

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks