General

  • Target

    Creal.exe

  • Size

    15.2MB

  • Sample

    240626-qef7dswbqd

  • MD5

    109f9dfd522a6cf05dd0d3686cc1be02

  • SHA1

    d18a902dbc7659fa5de7c19d9df3fce22e969f9f

  • SHA256

    fba33c1646c2c65c15be465993c125a7eee4f9a8ebe3c0c9d2ffae381a707757

  • SHA512

    e7c4c0d65dbc0fa4d8bb158af059d2688e2f457cbc4eb049f050f6fab2c3c4d560d36df65e147b3ba2a534953485074fe96a6cbba51725517f2c6a4174b9f395

  • SSDEEP

    393216:IEkZQrdQuslSq99oWOv+9rzg3Jt/Q9lq3h:IhQrdQuSDorvSrM3zI9lKh

Malware Config

Targets

    • Target

      Creal.exe

    • Size

      15.2MB

    • MD5

      109f9dfd522a6cf05dd0d3686cc1be02

    • SHA1

      d18a902dbc7659fa5de7c19d9df3fce22e969f9f

    • SHA256

      fba33c1646c2c65c15be465993c125a7eee4f9a8ebe3c0c9d2ffae381a707757

    • SHA512

      e7c4c0d65dbc0fa4d8bb158af059d2688e2f457cbc4eb049f050f6fab2c3c4d560d36df65e147b3ba2a534953485074fe96a6cbba51725517f2c6a4174b9f395

    • SSDEEP

      393216:IEkZQrdQuslSq99oWOv+9rzg3Jt/Q9lq3h:IhQrdQuSDorvSrM3zI9lKh

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks