Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/02/2025, 12:02
Behavioral task
behavioral1
Sample
Flasher.exe
Resource
win7-20240903-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
Flasher.exe
Resource
win10v2004-20250217-en
6 signatures
150 seconds
General
-
Target
Flasher.exe
-
Size
573KB
-
MD5
eff931961e9134a9945fadd29df90ff7
-
SHA1
cc27b1d909b14a01a88d27545007703aa9c82d36
-
SHA256
f126cbaecfd33f8026cf15a223857503f147b947dccb7a5da727ea19a4a5963b
-
SHA512
5a5bdd3458b64ff434598dd09c98d2ef31945288560d2995ec6200ed0894a71e2522d5ffbdb23f9fcd59159bb811983b0c2862b688cff5fc7fbb50e9a113f290
-
SSDEEP
12288:ntuH9xWLgvHIh+bOH1JcyDXFJgazKHWs88/vNKI8e:nto9xWLgvHI+OHPcy7T7zBs88/vgZe
Score
10/10
Malware Config
Signatures
-
Detects SvcStealer Payload 4 IoCs
SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.
resource yara_rule behavioral1/memory/1192-7-0x0000000006370000-0x000000000640B000-memory.dmp family_svcstealer behavioral1/memory/3064-5-0x000000013FDC0000-0x000000013FE55000-memory.dmp family_svcstealer behavioral1/memory/1192-2-0x0000000006370000-0x000000000640B000-memory.dmp family_svcstealer behavioral1/memory/3064-0-0x000000013FDC0000-0x000000013FE55000-memory.dmp family_svcstealer -
SvcStealer, Diamotrix
SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.
-
Svcstealer family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\bfbeffefec = "\"C:\\ProgramData\\bfbeffefec.exe\"" Flasher.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3064 Flasher.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 3064 wrote to memory of 1192 3064 Flasher.exe 21