General
-
Target
Flasher.exe
-
Size
573KB
-
Sample
250228-n5dsvayvhz
-
MD5
eff931961e9134a9945fadd29df90ff7
-
SHA1
cc27b1d909b14a01a88d27545007703aa9c82d36
-
SHA256
f126cbaecfd33f8026cf15a223857503f147b947dccb7a5da727ea19a4a5963b
-
SHA512
5a5bdd3458b64ff434598dd09c98d2ef31945288560d2995ec6200ed0894a71e2522d5ffbdb23f9fcd59159bb811983b0c2862b688cff5fc7fbb50e9a113f290
-
SSDEEP
12288:ntuH9xWLgvHIh+bOH1JcyDXFJgazKHWs88/vNKI8e:nto9xWLgvHI+OHPcy7T7zBs88/vgZe
Behavioral task
behavioral1
Sample
Flasher.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Flasher.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
svcstealer
3.0
185.81.68.156
176.113.115.149
-
url_paths
/svcstealer/get.php
Targets
-
-
Target
Flasher.exe
-
Size
573KB
-
MD5
eff931961e9134a9945fadd29df90ff7
-
SHA1
cc27b1d909b14a01a88d27545007703aa9c82d36
-
SHA256
f126cbaecfd33f8026cf15a223857503f147b947dccb7a5da727ea19a4a5963b
-
SHA512
5a5bdd3458b64ff434598dd09c98d2ef31945288560d2995ec6200ed0894a71e2522d5ffbdb23f9fcd59159bb811983b0c2862b688cff5fc7fbb50e9a113f290
-
SSDEEP
12288:ntuH9xWLgvHIh+bOH1JcyDXFJgazKHWs88/vNKI8e:nto9xWLgvHI+OHPcy7T7zBs88/vgZe
-
Detects SvcStealer Payload
SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.
-
SvcStealer, Diamotrix
SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.
-
Svcstealer family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2