General
-
Target
creal.exe
-
Size
14.0MB
-
Sample
240204-vrabtsghgk
-
MD5
ab8b40d1559070d35e3881929c2a34f7
-
SHA1
58c7d72c240703ff64da1605876d6949b0e7cb42
-
SHA256
8a26a735341e4aff3486aaa3de1239d1a39c8a7cfe96c4b8e600cbc996f35836
-
SHA512
91a985f2b66dd69bd08460448487b5edbe4b203ad35b1d7381112ca3b18359f2d9f8a9da6fe40214bcf37d4c2f02aabedbc7afc56038ebe760cf634a9782892b
-
SSDEEP
393216:TEkMDlnwW+eGQRIMTozGxu8C0ibfz6eKk7J1bmXiWCNi:TUD1wW+e5R5oztZ026eKk7FVNi
Behavioral task
behavioral1
Sample
creal.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
creal.exe
-
Size
14.0MB
-
MD5
ab8b40d1559070d35e3881929c2a34f7
-
SHA1
58c7d72c240703ff64da1605876d6949b0e7cb42
-
SHA256
8a26a735341e4aff3486aaa3de1239d1a39c8a7cfe96c4b8e600cbc996f35836
-
SHA512
91a985f2b66dd69bd08460448487b5edbe4b203ad35b1d7381112ca3b18359f2d9f8a9da6fe40214bcf37d4c2f02aabedbc7afc56038ebe760cf634a9782892b
-
SSDEEP
393216:TEkMDlnwW+eGQRIMTozGxu8C0ibfz6eKk7J1bmXiWCNi:TUD1wW+e5R5oztZ026eKk7FVNi
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-