Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2025, 12:02
Behavioral task
behavioral1
Sample
Flasher.exe
Resource
win7-20240903-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
Flasher.exe
Resource
win10v2004-20250217-en
6 signatures
150 seconds
General
-
Target
Flasher.exe
-
Size
573KB
-
MD5
eff931961e9134a9945fadd29df90ff7
-
SHA1
cc27b1d909b14a01a88d27545007703aa9c82d36
-
SHA256
f126cbaecfd33f8026cf15a223857503f147b947dccb7a5da727ea19a4a5963b
-
SHA512
5a5bdd3458b64ff434598dd09c98d2ef31945288560d2995ec6200ed0894a71e2522d5ffbdb23f9fcd59159bb811983b0c2862b688cff5fc7fbb50e9a113f290
-
SSDEEP
12288:ntuH9xWLgvHIh+bOH1JcyDXFJgazKHWs88/vNKI8e:nto9xWLgvHI+OHPcy7T7zBs88/vgZe
Score
10/10
Malware Config
Signatures
-
Detects SvcStealer Payload 4 IoCs
SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.
resource yara_rule behavioral2/memory/1468-0-0x00007FF7217B0000-0x00007FF721845000-memory.dmp family_svcstealer behavioral2/memory/3364-1-0x0000000003180000-0x000000000321B000-memory.dmp family_svcstealer behavioral2/memory/3364-5-0x0000000003180000-0x000000000321B000-memory.dmp family_svcstealer behavioral2/memory/1468-6-0x00007FF7217B0000-0x00007FF721845000-memory.dmp family_svcstealer -
SvcStealer, Diamotrix
SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.
-
Svcstealer family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ddcedbbabcc = "\"C:\\ProgramData\\ddcedbbabcc.exe\"" Flasher.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1468 Flasher.exe 1468 Flasher.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 1468 wrote to memory of 3364 1468 Flasher.exe 55