General

  • Target

    creal.exe

  • Size

    14.0MB

  • Sample

    240204-vrabtsghgk

  • MD5

    ab8b40d1559070d35e3881929c2a34f7

  • SHA1

    58c7d72c240703ff64da1605876d6949b0e7cb42

  • SHA256

    8a26a735341e4aff3486aaa3de1239d1a39c8a7cfe96c4b8e600cbc996f35836

  • SHA512

    91a985f2b66dd69bd08460448487b5edbe4b203ad35b1d7381112ca3b18359f2d9f8a9da6fe40214bcf37d4c2f02aabedbc7afc56038ebe760cf634a9782892b

  • SSDEEP

    393216:TEkMDlnwW+eGQRIMTozGxu8C0ibfz6eKk7J1bmXiWCNi:TUD1wW+e5R5oztZ026eKk7FVNi

Malware Config

Targets

    • Target

      creal.exe

    • Size

      14.0MB

    • MD5

      ab8b40d1559070d35e3881929c2a34f7

    • SHA1

      58c7d72c240703ff64da1605876d6949b0e7cb42

    • SHA256

      8a26a735341e4aff3486aaa3de1239d1a39c8a7cfe96c4b8e600cbc996f35836

    • SHA512

      91a985f2b66dd69bd08460448487b5edbe4b203ad35b1d7381112ca3b18359f2d9f8a9da6fe40214bcf37d4c2f02aabedbc7afc56038ebe760cf634a9782892b

    • SSDEEP

      393216:TEkMDlnwW+eGQRIMTozGxu8C0ibfz6eKk7J1bmXiWCNi:TUD1wW+e5R5oztZ026eKk7FVNi

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks