General

  • Target

    Creal.exe

  • Size

    7.3MB

  • Sample

    241016-2cwd3szdpr

  • MD5

    b867469d2d9f97d98f60c9ea4302418a

  • SHA1

    e67fcbb3e8043436739391efa883ec99f8eab30a

  • SHA256

    381116b75b5da7f4a92f21197efceb9a202ecae7b8d852dab506fbb97e2e150c

  • SHA512

    027cdfd76b942ac303258976c0f936bd5ef12f59a28bf2f165f6d1d6686bcd533dfff67bbcc4eac4d7eb2a631d80b7199a6599869419aaef90968417b2e6633f

  • SSDEEP

    196608:QL1OgOCT+aj1rpnrJehwiIbZg4TIdQNm5XKCt7o5cJwDb2:QpoCT+aoqbCdQyftBJwDb2

Malware Config

Targets

    • Target

      Creal.exe

    • Size

      7.3MB

    • MD5

      b867469d2d9f97d98f60c9ea4302418a

    • SHA1

      e67fcbb3e8043436739391efa883ec99f8eab30a

    • SHA256

      381116b75b5da7f4a92f21197efceb9a202ecae7b8d852dab506fbb97e2e150c

    • SHA512

      027cdfd76b942ac303258976c0f936bd5ef12f59a28bf2f165f6d1d6686bcd533dfff67bbcc4eac4d7eb2a631d80b7199a6599869419aaef90968417b2e6633f

    • SSDEEP

      196608:QL1OgOCT+aj1rpnrJehwiIbZg4TIdQNm5XKCt7o5cJwDb2:QpoCT+aoqbCdQyftBJwDb2

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks