General
-
Target
creal.exe
-
Size
15.8MB
-
Sample
240206-31gq9scebn
-
MD5
0202d06ea52870cd5e8ae02c8bfa0157
-
SHA1
74a4c486075684ef20805ee5c7a979e9925e3a7d
-
SHA256
997bc2b7665781bc5162a4aa645b4afc4705e835a030ea4ef39b0189a7ccb3b7
-
SHA512
17dc78e5e89947bf9fa0c576d642f9e5a40ca356bf7b34e8b224976a6b547f024c28f3f3e4be4837df54e4d049d63a75fa315eb230469058ad3ccc27905c5085
-
SSDEEP
393216:koEkMD2ntpUTLfhJsW+eGQRCMTozGxu8C0ibfz6e57Y1bmXiWCUI:TUDaHUTLJSW+e5RLoztZ026e5WFVUI
Behavioral task
behavioral1
Sample
creal.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
creal.exe
-
Size
15.8MB
-
MD5
0202d06ea52870cd5e8ae02c8bfa0157
-
SHA1
74a4c486075684ef20805ee5c7a979e9925e3a7d
-
SHA256
997bc2b7665781bc5162a4aa645b4afc4705e835a030ea4ef39b0189a7ccb3b7
-
SHA512
17dc78e5e89947bf9fa0c576d642f9e5a40ca356bf7b34e8b224976a6b547f024c28f3f3e4be4837df54e4d049d63a75fa315eb230469058ad3ccc27905c5085
-
SSDEEP
393216:koEkMD2ntpUTLfhJsW+eGQRCMTozGxu8C0ibfz6e57Y1bmXiWCUI:TUDaHUTLJSW+e5RLoztZ026e5WFVUI
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-