Resubmissions
02-03-2024 02:58
240302-dglhnshe93 10Behavioral task
behavioral1
Sample
Creal.py
Resource
win10v2004-20240226-en
windows10-2004-x64
6 signatures
600 seconds
Behavioral task
behavioral2
Sample
Creal.py
Resource
win11-20240221-en
windows11-21h2-x64
3 signatures
600 seconds
General
-
Target
Creal.py
-
Size
42KB
-
MD5
83aed8c87af21cea45b01f4ac44db276
-
SHA1
885217547b66ab229e2f9a9e75237b5d86cac5d2
-
SHA256
9ccc070f6adaf5c96a0dd220bbe2accb7457b73669734101681404d05a38fb67
-
SHA512
ee5ba296ee5525dffb57b99a4c4a3b2981553ac4e70a97d23029ff5aa2aa8724e9d6e6edcc9eabdbb3b983a9cf14734dfa2e732e82f201313116154f22c46de0
-
SSDEEP
768:QWDAWR5nX5hjhOCSOHSFhf1PffpLCBzwjSqefgSmr4C8Pi7W/:QWkWR5nHjhFSJLR+2SmM+W/
Score
10/10
Malware Config
Signatures
-
An infostealer written in Python and packaged with PyInstaller. 1 IoCs
resource yara_rule sample crealstealer -
Crealstealer family
Files
-
Creal.py