General

  • Target

    Creal.exe

  • Size

    19.4MB

  • Sample

    240117-p6z8xagcc6

  • MD5

    dd53ed3706c2430bc5e8a338871db91a

  • SHA1

    93ab5025b0602b1d3b8e0ebf3a8a97457b2c639c

  • SHA256

    4771e5eedbaf4e273902971498a98a0caf93c34117dae57576d31183144c8c4e

  • SHA512

    b5d159d596493d6b555a963f351cf9e67c2145c6ff1af7a1621fc12fce00c3559be52b8cba984b3948fa3df215721374d988817356caa4ccfcec0b0a940c1d35

  • SSDEEP

    393216:REkZQtsrr7M5livQETSrvJQnqOq/rx7zdCyd06:RhQtsX7M5lmQEWrhQAzi

Malware Config

Targets

    • Target

      Creal.exe

    • Size

      19.4MB

    • MD5

      dd53ed3706c2430bc5e8a338871db91a

    • SHA1

      93ab5025b0602b1d3b8e0ebf3a8a97457b2c639c

    • SHA256

      4771e5eedbaf4e273902971498a98a0caf93c34117dae57576d31183144c8c4e

    • SHA512

      b5d159d596493d6b555a963f351cf9e67c2145c6ff1af7a1621fc12fce00c3559be52b8cba984b3948fa3df215721374d988817356caa4ccfcec0b0a940c1d35

    • SSDEEP

      393216:REkZQtsrr7M5livQETSrvJQnqOq/rx7zdCyd06:RhQtsX7M5lmQEWrhQAzi

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks