Behavioral task
behavioral1
Sample
creal.py
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
creal.py
Resource
win10v2004-20240221-en
20 signatures
150 seconds
General
-
Target
creal.py
-
Size
42KB
-
MD5
29198d66a396295aecd774053e5ded02
-
SHA1
0da5fdb00aefa2ef2bed6ffe614a88caf6483b75
-
SHA256
803e6d299ab9239cd3a68219edd285433eb625b28bdb056bc54b507ff92c71d1
-
SHA512
47dbfa3f5e112694ae91cd182470bd209cadd835f9fe8d0b07edf72fe5ff018ac8dadae27bfeea7fae7e4dfb7507afdb3a2adbad542916d5f2cfe0bf66333091
-
SSDEEP
768:IRDAWRqnXeihOCSlqLCxzAj6VppDPi7WA:IRkWRqnhhFSQLhmVpoWA
Score
10/10
Malware Config
Signatures
-
An infostealer written in Python and packaged with PyInstaller. 1 IoCs
resource yara_rule sample crealstealer -
Crealstealer family
Files
-
creal.py