C:\_projekty\clrinject\clrinject-cli\bin\Release\clrinject-cli64.pdb
Overview
overview
9Static
static
3Creed_All_Spoofer.zip
windows7-x64
1Creed_All_Spoofer.zip
windows10-2004-x64
1Creed All ...ed.exe
windows7-x64
9Creed All ...ed.exe
windows10-2004-x64
9Creed All ...ia.txt
windows7-x64
1Creed All ...ia.txt
windows10-2004-x64
1Creed All ...ao.exe
windows7-x64
1Creed All ...ao.exe
windows10-2004-x64
1Creed All ...un.bat
windows7-x64
1Creed All ...un.bat
windows10-2004-x64
1Creed All ...OP.exe
windows7-x64
1Creed All ...OP.exe
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
Creed_All_Spoofer.zip
Resource
win7-20240319-es
Behavioral task
behavioral2
Sample
Creed_All_Spoofer.zip
Resource
win10v2004-20240226-es
Behavioral task
behavioral3
Sample
Creed All Spoofer/Creed.exe
Resource
win7-20240221-es
Behavioral task
behavioral4
Sample
Creed All Spoofer/Creed.exe
Resource
win10v2004-20240226-es
Behavioral task
behavioral5
Sample
Creed All Spoofer/Leia.txt
Resource
win7-20240319-es
Behavioral task
behavioral6
Sample
Creed All Spoofer/Leia.txt
Resource
win10v2004-20240226-es
Behavioral task
behavioral7
Sample
Creed All Spoofer/Lmao.exe
Resource
win7-20240221-es
Behavioral task
behavioral8
Sample
Creed All Spoofer/Lmao.exe
Resource
win10v2004-20240226-es
Behavioral task
behavioral9
Sample
Creed All Spoofer/Run.bat
Resource
win7-20231129-es
Behavioral task
behavioral10
Sample
Creed All Spoofer/Run.bat
Resource
win10v2004-20240226-es
Behavioral task
behavioral11
Sample
Creed All Spoofer/SpArtOrOnTOP.exe
Resource
win7-20240220-es
Behavioral task
behavioral12
Sample
Creed All Spoofer/SpArtOrOnTOP.exe
Resource
win10v2004-20240226-es
General
-
Target
Creed_All_Spoofer.zip
-
Size
22.6MB
-
MD5
dbccb68e24b71fca6656487bff0622ee
-
SHA1
825e3b6a5bf3a2390d43e49372e6fdde56731591
-
SHA256
8e51e075b0a0951a99add4447bbdd73695849897d801602d6defbad0fb1d198d
-
SHA512
3b6bf2ed8a50b9fa511a9a57b4f5e38ce89e1086e805e5e3dadb98774a55a6d3f4997ba71bee7912de004474045ea623c2a9bfec103e51ed4587350d7097bdc5
-
SSDEEP
393216:mEAWbv5I9f8mFXiTvZabvubDnznrClhgHRq+cUgy+ICG991KWniYI580a5GJC:mEAq5I9JivDbDnTvRDBR+H891Pi9oo0
Malware Config
Signatures
-
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource unpack001/Creed All Spoofer/Creed.exe unpack001/Creed All Spoofer/Lmao.exe unpack001/Creed All Spoofer/SpArtOrOnTOP
Files
-
Creed_All_Spoofer.zip.zip
-
Creed All Spoofer/Creed.exe.exe windows:4 windows x64 arch:x64
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 22.8MB - Virtual size: 22.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Creed All Spoofer/Leia.txt
-
Creed All Spoofer/Lmao.exe.exe windows:6 windows x64 arch:x64
f2a61738044e6d18a53e38972ea5f059
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
Process32First
lstrcpynW
InitializeCriticalSectionEx
CreateToolhelp32Snapshot
MultiByteToWideChar
GetLastError
Process32Next
CloseHandle
DeleteCriticalSection
OutputDebugStringW
WaitForSingleObject
GetCurrentProcess
CreateRemoteThread
GetExitCodeThread
OpenProcess
VirtualAllocEx
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetProcAddress
GetModuleHandleA
WriteProcessMemory
ReadProcessMemory
VirtualFreeEx
IsDebuggerPresent
vcruntime140
memset
__C_specific_handler
_CxxThrowException
api-ms-win-crt-runtime-l1-1-0
exit
terminate
__p___argv
__p___argc
_register_thread_local_exe_atexit_callback
_initterm_e
_initterm
_get_initial_narrow_environment
_set_app_type
_seh_filter_exe
_cexit
_crt_atexit
_register_onexit_function
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
_c_exit
_exit
api-ms-win-crt-heap-l1-1-0
_set_new_mode
_recalloc
free
calloc
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vsprintf
__p__commode
_set_fmode
__stdio_common_vfprintf
__acrt_iob_func
api-ms-win-crt-convert-l1-1-0
strtol
api-ms-win-crt-string-l1-1-0
_stricmp
strncmp
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 720B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
remCode Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Creed All Spoofer/Run.bat
-
Creed All Spoofer/SpArtOrOnTOP.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.pF, Size: - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.7U4 Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.eS^ Size: 367KB - Virtual size: 366KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ