General
-
Target
SecuriteInfo.com.FileRepMalware.24556.13413.exe
-
Size
1.3MB
-
Sample
250401-jmmktayk12
-
MD5
7649c0971252ffe91d89be9c5e975116
-
SHA1
fec1eea05dc92f5cab9ccf4f10e9fd3dcaf9d79d
-
SHA256
401c472ad7425e95b53f52be849016afdd467a4728ac8796ff1a932731b1d3ce
-
SHA512
fb0697c7857eeb655b3aa5d88f18d22b4ce132f1dbdb767701851776adadd0aa30d597c297ef6556e0f273d66b65ca03194f468915b0f67c32ee890ad4966255
-
SSDEEP
24576:3Xu/KM5dja19/WFrsujlEVEv1Ob9aitFP3mHStKJIZMu3z/FieOO6aVP/nUrIOze:H66S6VvD3zfRi7831g1KkR
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.FileRepMalware.24556.13413.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
svcstealer
3.2
185.81.68.156
176.113.115.149
-
url_paths
/svcstealer/get.php
Targets
-
-
Target
SecuriteInfo.com.FileRepMalware.24556.13413.exe
-
Size
1.3MB
-
MD5
7649c0971252ffe91d89be9c5e975116
-
SHA1
fec1eea05dc92f5cab9ccf4f10e9fd3dcaf9d79d
-
SHA256
401c472ad7425e95b53f52be849016afdd467a4728ac8796ff1a932731b1d3ce
-
SHA512
fb0697c7857eeb655b3aa5d88f18d22b4ce132f1dbdb767701851776adadd0aa30d597c297ef6556e0f273d66b65ca03194f468915b0f67c32ee890ad4966255
-
SSDEEP
24576:3Xu/KM5dja19/WFrsujlEVEv1Ob9aitFP3mHStKJIZMu3z/FieOO6aVP/nUrIOze:H66S6VvD3zfRi7831g1KkR
-
Detects SvcStealer Payload
SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.
-
SvcStealer, Diamotrix
SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.
-
Svcstealer family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2