General
-
Target
creed.exe
-
Size
76.8MB
-
Sample
241210-ek4n4ayjdq
-
MD5
4a06d4abd4e05eaed76afe296fd5df01
-
SHA1
51921b6d814044b00cc4bc9dd04a76eee840071c
-
SHA256
24362ff6a324800a9cdea2d023dfbe4f21b195c4ea3ad51c4dc9c9cfecdf4c87
-
SHA512
e70fec831ba539796460f7c05f39f1f239921310854872aeaaf171c6542cbc090fa8ebe14ffe379698b12d4270b3cfb1920e65d9c3dfb8de8e90f48319fcfdd5
-
SSDEEP
1572864:h41lfWMHmUSk8IpG7V+VPhqYdfzE7xFlhq4iYweyJulZUdgM34iRybL/Z9Ui:h41F7mUSkB05awcfSLypuQ3qh9U
Behavioral task
behavioral1
Sample
creed.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
creed.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
creed.exe
-
Size
76.8MB
-
MD5
4a06d4abd4e05eaed76afe296fd5df01
-
SHA1
51921b6d814044b00cc4bc9dd04a76eee840071c
-
SHA256
24362ff6a324800a9cdea2d023dfbe4f21b195c4ea3ad51c4dc9c9cfecdf4c87
-
SHA512
e70fec831ba539796460f7c05f39f1f239921310854872aeaaf171c6542cbc090fa8ebe14ffe379698b12d4270b3cfb1920e65d9c3dfb8de8e90f48319fcfdd5
-
SSDEEP
1572864:h41lfWMHmUSk8IpG7V+VPhqYdfzE7xFlhq4iYweyJulZUdgM34iRybL/Z9Ui:h41F7mUSkB05awcfSLypuQ3qh9U
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-