General

  • Target

    creal.exe

  • Size

    17.3MB

  • Sample

    240222-q24afaad6z

  • MD5

    b1445dcd313c443ed4f812986993a0fd

  • SHA1

    8029b4c221484bfcb27caeffb992466e33b3eaab

  • SHA256

    c3287943f04829680ed363dde92950259b70235de215e44b958ff2090b960d1f

  • SHA512

    0ccd833387a7a34cdadcaf266d5b24a0e5f52870ee1551bd045ad680bcec5c1f33dcdc058c85d5f9d95efd8e9f4753f2869cf72f781a039ea296f95ab8349894

  • SSDEEP

    393216:eiIE7Yoa+4uHvwiHi+2ohcyLkW+eGQRe9jo7BGCQlIaJKt/WoAfXQF:f7ra+RHvJHiRyc0kW+e5Re9MppegF

Malware Config

Targets

    • Target

      creal.exe

    • Size

      17.3MB

    • MD5

      b1445dcd313c443ed4f812986993a0fd

    • SHA1

      8029b4c221484bfcb27caeffb992466e33b3eaab

    • SHA256

      c3287943f04829680ed363dde92950259b70235de215e44b958ff2090b960d1f

    • SHA512

      0ccd833387a7a34cdadcaf266d5b24a0e5f52870ee1551bd045ad680bcec5c1f33dcdc058c85d5f9d95efd8e9f4753f2869cf72f781a039ea296f95ab8349894

    • SSDEEP

      393216:eiIE7Yoa+4uHvwiHi+2ohcyLkW+eGQRe9jo7BGCQlIaJKt/WoAfXQF:f7ra+RHvJHiRyc0kW+e5Re9MppegF

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks