CreepyDrive

Malware Profile Updated 25 days ago
Download STIX
Preview STIX
CreepyDrive is a type of malware that can infect and damage users' computers or devices. Once inside, it can steal personal information, disrupt operations, or even hold data hostage for ransom. CreepyDrive utilizes a POLONIUM-owned OneDrive storage account for command and control. It makes a predictable sequence of requests to Microsoft authentication servers and OneDrive that can be detected using the Invoke-WebRequest cmdlet. Despite its predictive pattern of requests, CreepyDrive does not contain victim identifiers, making it difficult to use the same OneDrive account for multiple victims. After infecting a device, the CreepyDrive implant repeatedly sleeps and re-executes in a loop until the process is terminated. It is crucial to protect your computer or device from malicious software like CreepyDrive by avoiding suspicious downloads, emails, or websites. Additionally, regularly updating your antivirus software, keeping your operating system up-to-date, and being cautious when opening email attachments can help prevent malware infections.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Associated Malware
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Associated Threat Actors
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Associated Vulnerabilities
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Source Document References
Information about the CreepyDrive Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
SourceCreatedAtTitle
MITRE
a year ago
Exposing POLONIUM activity and infrastructure targeting Israeli organizations - Microsoft Security Blog