General
-
Target
Creal.exe
-
Size
7.2MB
-
Sample
240105-1zfrgacff3
-
MD5
7e588baa61473b65785f3a5d06ce7405
-
SHA1
87984d1d3fd3bcabaab58cabb9a58a64b9407dce
-
SHA256
ae4471b251799f00b46508e52475758f6ea3d8341a00cfd34a3da60913081272
-
SHA512
2c7cbbf05b498c64d81d840732a0df993aec163c8a4f71cb5f3e40c083416a38c8fe7b5d2c37014f68bf9594759ca57e2ab86de29d2325ae7b4007562b455709
-
SSDEEP
196608:8CT+aj1rpnrJehwiIbZg4TIdQNm5XKCt7oQqLJad0+:8CT+aoqbCdQyftlqLJad0+
Behavioral task
behavioral1
Sample
Creal.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
Creal.exe
-
Size
7.2MB
-
MD5
7e588baa61473b65785f3a5d06ce7405
-
SHA1
87984d1d3fd3bcabaab58cabb9a58a64b9407dce
-
SHA256
ae4471b251799f00b46508e52475758f6ea3d8341a00cfd34a3da60913081272
-
SHA512
2c7cbbf05b498c64d81d840732a0df993aec163c8a4f71cb5f3e40c083416a38c8fe7b5d2c37014f68bf9594759ca57e2ab86de29d2325ae7b4007562b455709
-
SSDEEP
196608:8CT+aj1rpnrJehwiIbZg4TIdQNm5XKCt7oQqLJad0+:8CT+aoqbCdQyftlqLJad0+
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-