Creamsicle

Description

(FireEye) CREAMSICLE attempts to download an encoded executable from a specified location.

The downloaded file is decoded, written to disk as %APPDATA%\Norton360\Engine\5.1.0.29\ccSvcHst.exe, and padded with 51,200,000 null bytes. CREAMSICLE does not appear to execute the downloaded file, presumably relying on Windows to do so (using the shortcut file in the user’s Startup folder) the next time the user logs in.

Names

Name
Creamsicle

Category

Malware

Type

  • Downloader

Information

Malpedia

Alienvault Otx

Other Information

Uuid

ec3678b0-7ffb-4b53-ae26-cfbd54dfc3df

Last Card Change

2020-04-23