Behavioral task
behavioral1
Sample
Creal.py
Resource
win7-20240215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Creal.py
Resource
win10v2004-20240419-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
Creal.py
-
Size
211KB
-
MD5
dc8e4f8ca562819e37d9328b47f6627e
-
SHA1
1b30e4b64f275f155a905d27e1a137744c3654ab
-
SHA256
644ee8e67af2b64b9b2cfecbbdb63b4b3098dcd45affc2af18c696e9ba06d154
-
SHA512
ff11069536f0731c987ac9b1355b1ea5dc6a9b75ea4f36620b12f1a5531bc152288ce1536ef0d105aabad38bd944b83612ccf8e1e57de47a5259ea8e2c26a6e4
-
SSDEEP
3072:Q1kT0hhFhhglvEjYm+W94RPiEmWoqfKTUkaF5996aH0ji9Jl3LH0NpmSBKHR:gAPBM4RPiERoqkZw7HOpmSBQ
Score
10/10
Malware Config
Signatures
-
An infostealer written in Python and packaged with PyInstaller. 1 IoCs
resource yara_rule sample crealstealer -
Crealstealer family
Files
-
Creal.py