URLhaus Database

URLhaus tries to identify the malware associated with the payload served by a certain malware URL. In case URLhaus is able to identify the associated malware family, the payload will be tagged accordingly (field signature). The page below gives you an overview on payloads that URLhaus has identified as CrealStealer.

Database Entry


Signature:CrealStealer
Firstseen:2023-03-23 05:52:08 UTC
Lastseen:2023-12-19 15:08:24 UTC
Unique Payloads:4
URLs:4

Payload


The table below shows all payloads that have been identified as CrealStealer.

Firstseen (UTC)SHA256File TypeFile sizeVT
2023-12-19 15:08:2415548dc4aab59a1ecc65d7cbe37b2a6224e8be7682621e8f6b9ed851ab6f4e97Executable exe13'815'856Virustotal results 20 / 66 (30.30)
2023-10-09 12:32:2238da212dcc6fe50023ce87fc64067129766f509c664a354994690e4a1f1dc395Executable exe18'954'843Virustotal results 33 / 72 (45.83)
2023-04-10 15:59:14b5e6b887d6175aab915bdadee6b804a8815e9cd43ad208eedea464b338cf8c3cExecutable exe17'445'251Virustotal results 13 / 70 (18.57)
2023-03-23 05:52:087dd0f281b3da915e99690900150c0af179d057ca09e36bc33ef699d497e680aaExecutable exe15'260'816Virustotal results 20 / 67 (29.85)

Number of entries displayed: 4 (max: 1'000)