General

  • Target

    USDT Flasher Private v2.2.exe

  • Size

    1.9MB

  • Sample

    250404-z4dx1axkz8

  • MD5

    051d7528b34a6a04c5a99ebde64adcb4

  • SHA1

    4ceee7ca158359a5ac373442c83b3942d97c5124

  • SHA256

    acb84a0336a45dc387209935852c267abba63b86d820c6a8ea5cbcce0dd7d5e4

  • SHA512

    15cfe52738281764625e04cbb65ab1143d63587fa5a7546d2b016e93801584e82506871bb2810738583ecdb88a92e2bc60ceb106db696028f1f22221a8449c5b

  • SSDEEP

    24576:gPgvWGZl9tJ5Mo2QhG3aMUFgEsNj9dfF2b6OZBfebd6bIt3MZ2N6zKnBDB+obJwK:0+hZd0Nj9vi6WGkb43uz49B+obC+/v

Malware Config

Extracted

Family

svcstealer

C2

176.113.115.149

185.81.68.156

Extracted

Family

svcstealer

Version

3.3

C2

185.81.68.156

176.113.115.149

Attributes
  • url_paths

    /svcstealer/get.php

Targets

    • Target

      USDT Flasher Private v2.2.exe

    • Size

      1.9MB

    • MD5

      051d7528b34a6a04c5a99ebde64adcb4

    • SHA1

      4ceee7ca158359a5ac373442c83b3942d97c5124

    • SHA256

      acb84a0336a45dc387209935852c267abba63b86d820c6a8ea5cbcce0dd7d5e4

    • SHA512

      15cfe52738281764625e04cbb65ab1143d63587fa5a7546d2b016e93801584e82506871bb2810738583ecdb88a92e2bc60ceb106db696028f1f22221a8449c5b

    • SSDEEP

      24576:gPgvWGZl9tJ5Mo2QhG3aMUFgEsNj9dfF2b6OZBfebd6bIt3MZ2N6zKnBDB+obJwK:0+hZd0Nj9vi6WGkb43uz49B+obC+/v

    • Detects SvcStealer Payload

      SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.

    • SvcStealer, Diamotrix

      SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.

    • Svcstealer family

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks