General

  • Target

    Creal.exe

  • Size

    16.6MB

  • Sample

    250304-swc76sttgw

  • MD5

    7e3bc6e6c058cfc70033ba62ac026350

  • SHA1

    16c4c251dfeb6e3e914d167fc766194e90dbe304

  • SHA256

    6542308295ff6b80e525daafc799ee6e70f887b30c6b278da259f3fb9a846556

  • SHA512

    68f24871d4b8651070bb01398eff48d95d27c6b2307f33f0d74b25f31fbb9b5eb334930c082edc7087f125248dbedc1f7444cb6a5f7e4525e95f7527cdac5903

  • SSDEEP

    393216:mu7L/1VdQ2lN/m3pS+9J8ecH4K8zw4Jt8hXeSkM:mCLdVdQGKB9J8ecYK/P

Malware Config

Targets

    • Target

      Creal.exe

    • Size

      16.6MB

    • MD5

      7e3bc6e6c058cfc70033ba62ac026350

    • SHA1

      16c4c251dfeb6e3e914d167fc766194e90dbe304

    • SHA256

      6542308295ff6b80e525daafc799ee6e70f887b30c6b278da259f3fb9a846556

    • SHA512

      68f24871d4b8651070bb01398eff48d95d27c6b2307f33f0d74b25f31fbb9b5eb334930c082edc7087f125248dbedc1f7444cb6a5f7e4525e95f7527cdac5903

    • SSDEEP

      393216:mu7L/1VdQ2lN/m3pS+9J8ecH4K8zw4Jt8hXeSkM:mCLdVdQGKB9J8ecYK/P

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks