General

  • Target

    Crealexe.exe

  • Size

    7.2MB

  • Sample

    240107-xwyw4acbfm

  • MD5

    cd3df7cb617987725f0435887c0bbd05

  • SHA1

    2a95ff3dcf528d0a521c05db40e5a43ad70b5986

  • SHA256

    0e201afd9ce90d9a171cf3eeb999c36f38490c3a85e1d0349a8f18adaa0e72a7

  • SHA512

    c69dca39f0902f9d30bc2b49fac35aee81df4f7ede997942cd877070a01dd8265ea0925af97247cb8906dbd7293119d7257ca74fab2e8edaf0702ce3e26ee57d

  • SSDEEP

    196608:c3CT+aj1rpnrJehwiIbZg4TIdQNm5XKCt7oOGJwDb2:sCT+aoqbCdQyftfGJwDb2

Malware Config

Targets

    • Target

      Crealexe.exe

    • Size

      7.2MB

    • MD5

      cd3df7cb617987725f0435887c0bbd05

    • SHA1

      2a95ff3dcf528d0a521c05db40e5a43ad70b5986

    • SHA256

      0e201afd9ce90d9a171cf3eeb999c36f38490c3a85e1d0349a8f18adaa0e72a7

    • SHA512

      c69dca39f0902f9d30bc2b49fac35aee81df4f7ede997942cd877070a01dd8265ea0925af97247cb8906dbd7293119d7257ca74fab2e8edaf0702ce3e26ee57d

    • SSDEEP

      196608:c3CT+aj1rpnrJehwiIbZg4TIdQNm5XKCt7oOGJwDb2:sCT+aoqbCdQyftfGJwDb2

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks