General
-
Target
USDT Flasher Private v2.2.exe
-
Size
1.9MB
-
Sample
250404-z4dx1axkz8
-
MD5
051d7528b34a6a04c5a99ebde64adcb4
-
SHA1
4ceee7ca158359a5ac373442c83b3942d97c5124
-
SHA256
acb84a0336a45dc387209935852c267abba63b86d820c6a8ea5cbcce0dd7d5e4
-
SHA512
15cfe52738281764625e04cbb65ab1143d63587fa5a7546d2b016e93801584e82506871bb2810738583ecdb88a92e2bc60ceb106db696028f1f22221a8449c5b
-
SSDEEP
24576:gPgvWGZl9tJ5Mo2QhG3aMUFgEsNj9dfF2b6OZBfebd6bIt3MZ2N6zKnBDB+obJwK:0+hZd0Nj9vi6WGkb43uz49B+obC+/v
Behavioral task
behavioral1
Sample
USDT Flasher Private v2.2.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
svcstealer
176.113.115.149
185.81.68.156
Extracted
svcstealer
3.3
185.81.68.156
176.113.115.149
-
url_paths
/svcstealer/get.php
Targets
-
-
Target
USDT Flasher Private v2.2.exe
-
Size
1.9MB
-
MD5
051d7528b34a6a04c5a99ebde64adcb4
-
SHA1
4ceee7ca158359a5ac373442c83b3942d97c5124
-
SHA256
acb84a0336a45dc387209935852c267abba63b86d820c6a8ea5cbcce0dd7d5e4
-
SHA512
15cfe52738281764625e04cbb65ab1143d63587fa5a7546d2b016e93801584e82506871bb2810738583ecdb88a92e2bc60ceb106db696028f1f22221a8449c5b
-
SSDEEP
24576:gPgvWGZl9tJ5Mo2QhG3aMUFgEsNj9dfF2b6OZBfebd6bIt3MZ2N6zKnBDB+obJwK:0+hZd0Nj9vi6WGkb43uz49B+obC+/v
-
Detects SvcStealer Payload
SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.
-
SvcStealer, Diamotrix
SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.
-
Svcstealer family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2