Report - svcstealer.exe

Browser Login Data Stealer Generic Malware Malicious Library UPX PE File PE64 OS Processor Check ZIP Format JPEG Format
ScreenShot
Created 2025.04.26 14:25 Machine s1_win7_x6403
Filename svcstealer.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
9
Behavior Score
7.8
ZERO API file : malware
VT API (file) 50 detected (Malicious, score, Ghanarava, Lazy, Unsafe, Vskc, confidence, 100%, GenusT, EVUF, Attribute, HighConfidence, high confidence, flrd, Nekark, OskiStealer, CLASSIC, qqbgt, Siggen31, Static AI, Malicious PE, Detected, Kepavll, ABTrojan, OEER, R698804, Artemis, GdSda, R002H09DE25, Gencirc)
md5 763ba270b3a70837d7934e6a7fd5d8be
sha256 d954b8d3e0481a3d9b5c3c6342af84ebf619bc07d3020188222e6d225cc505e7
ssdeep 24576:8dDEllSAUzNwP9b1UcX1rX+O4k+rUPnKH:8xEllqaP9DrX+sK
imphash a145ad3a090ddd666e8ffb08cf197e7e
impfuzzy 96:rEjuAnMr8csfStQgBlQHHZHhN738njLuszRssjQ7BLpa:2uAnMJJBlg16ljEBLpa
  Network IP location

Signature (17cnts)

Level Description
danger File has been identified by 50 AntiVirus engines on VirusTotal as malicious
watch Attempts to access Bitcoin/ALTCoin wallets
watch Communicates with host for which no DNS query was performed
watch Drops a binary and executes it
watch Executes one or more WMI queries
notice An executable file was downloaded by the process svcstealer.exe
notice Creates executable files on the filesystem
notice Executes one or more WMI queries which can be used to identify virtual machines
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Repeatedly searches for a not-found process
notice Searches running processes potentially to identify processes for sandbox evasion
notice Sends data using the HTTP POST Method
notice Steals private information from local Internet browsers
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Queries for the computername

Rules (16cnts)

Level Name Description Collection
danger infoStealer_browser_b_Zero browser info stealer binaries (download)
danger infoStealer_browser_b_Zero browser info stealer binaries (upload)
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (download)
info IsPE64 (no description) binaries (upload)
info JPEG_Format_Zero JPEG Format binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info zip_file_format ZIP file format binaries (download)

Network (4cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://185.39.17.158/svcstealer/get.php RU Joint Stock Company Tagnet 185.39.17.158 clean
http://80.64.16.35/fgg.exe RU Joint Stock Company Tagnet 80.64.16.35 clean
80.64.16.35 RU Joint Stock Company Tagnet 80.64.16.35 malware
185.39.17.158 RU Joint Stock Company Tagnet 185.39.17.158 malware

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1400ef058 GetProcAddress
 0x1400ef060 LoadLibraryA
 0x1400ef068 SetCurrentDirectoryW
 0x1400ef070 Process32First
 0x1400ef078 GetComputerNameW
 0x1400ef080 K32GetModuleFileNameExW
 0x1400ef088 OpenProcess
 0x1400ef090 GetVersionExW
 0x1400ef098 GetModuleFileNameW
 0x1400ef0a0 GetLocalTime
 0x1400ef0a8 Process32Next
 0x1400ef0b0 GlobalMemoryStatusEx
 0x1400ef0b8 K32EnumProcesses
 0x1400ef0c0 GetSystemInfo
 0x1400ef0c8 CreateToolhelp32Snapshot
 0x1400ef0d0 ExitProcess
 0x1400ef0d8 TerminateThread
 0x1400ef0e0 IsDebuggerPresent
 0x1400ef0e8 DeleteFileW
 0x1400ef0f0 CreateThread
 0x1400ef0f8 HeapAlloc
 0x1400ef100 HeapFree
 0x1400ef108 GetProcessHeap
 0x1400ef110 FormatMessageA
 0x1400ef118 SetLastError
 0x1400ef120 OutputDebugStringA
 0x1400ef128 LocalFree
 0x1400ef130 HeapReAlloc
 0x1400ef138 GetCurrentProcess
 0x1400ef140 GetModuleHandleW
 0x1400ef148 HeapDestroy
 0x1400ef150 HeapCreate
 0x1400ef158 GetCurrentThreadId
 0x1400ef160 GetCurrentProcessId
 0x1400ef168 GetFullPathNameW
 0x1400ef170 GetFullPathNameA
 0x1400ef178 CreateMutexW
 0x1400ef180 HeapCompact
 0x1400ef188 SetFilePointer
 0x1400ef190 TryEnterCriticalSection
 0x1400ef198 MapViewOfFile
 0x1400ef1a0 UnmapViewOfFile
 0x1400ef1a8 SetEndOfFile
 0x1400ef1b0 SystemTimeToFileTime
 0x1400ef1b8 QueryPerformanceCounter
 0x1400ef1c0 WaitForSingleObject
 0x1400ef1c8 UnlockFile
 0x1400ef1d0 FlushViewOfFile
 0x1400ef1d8 LockFile
 0x1400ef1e0 WaitForSingleObjectEx
 0x1400ef1e8 OutputDebugStringW
 0x1400ef1f0 GetTickCount
 0x1400ef1f8 UnlockFileEx
 0x1400ef200 GetSystemTimeAsFileTime
 0x1400ef208 InitializeCriticalSection
 0x1400ef210 WideCharToMultiByte
 0x1400ef218 LoadLibraryW
 0x1400ef220 FormatMessageW
 0x1400ef228 GetFileAttributesA
 0x1400ef230 LeaveCriticalSection
 0x1400ef238 HeapValidate
 0x1400ef240 GetFileAttributesW
 0x1400ef248 GetTempPathW
 0x1400ef250 HeapSize
 0x1400ef258 LockFileEx
 0x1400ef260 EnterCriticalSection
 0x1400ef268 GetDiskFreeSpaceW
 0x1400ef270 CreateFileMappingA
 0x1400ef278 CreateFileMappingW
 0x1400ef280 GetDiskFreeSpaceA
 0x1400ef288 GetFileAttributesExW
 0x1400ef290 DeleteCriticalSection
 0x1400ef298 GetVersionExA
 0x1400ef2a0 GetTempPathA
 0x1400ef2a8 GetSystemTime
 0x1400ef2b0 AreFileApisANSI
 0x1400ef2b8 DeleteFileA
 0x1400ef2c0 FindFirstFileW
 0x1400ef2c8 CreateDirectoryW
 0x1400ef2d0 CopyFileW
 0x1400ef2d8 FindClose
 0x1400ef2e0 FindNextFileW
 0x1400ef2e8 GetWindowsDirectoryA
 0x1400ef2f0 GetVolumeInformationA
 0x1400ef2f8 TerminateProcess
 0x1400ef300 CopyFileA
 0x1400ef308 Process32FirstW
 0x1400ef310 RemoveDirectoryW
 0x1400ef318 Process32NextW
 0x1400ef320 GetWindowsDirectoryW
 0x1400ef328 GetVolumeInformationW
 0x1400ef330 FindFirstFileA
 0x1400ef338 FindNextFileA
 0x1400ef340 WriteConsoleW
 0x1400ef348 SetStdHandle
 0x1400ef350 EnumSystemLocalesEx
 0x1400ef358 IsValidLocaleName
 0x1400ef360 LCMapStringEx
 0x1400ef368 GetUserDefaultLocaleName
 0x1400ef370 CompareStringEx
 0x1400ef378 GetDateFormatEx
 0x1400ef380 GetTimeFormatEx
 0x1400ef388 lstrcatA
 0x1400ef390 FreeLibrary
 0x1400ef398 FlushFileBuffers
 0x1400ef3a0 lstrcpyA
 0x1400ef3a8 GetCurrentDirectoryW
 0x1400ef3b0 Sleep
 0x1400ef3b8 lstrlenA
 0x1400ef3c0 FreeEnvironmentStringsW
 0x1400ef3c8 GetEnvironmentStringsW
 0x1400ef3d0 GetTickCount64
 0x1400ef3d8 ReadConsoleW
 0x1400ef3e0 FlsFree
 0x1400ef3e8 FlsSetValue
 0x1400ef3f0 FlsGetValue
 0x1400ef3f8 FlsAlloc
 0x1400ef400 SetUnhandledExceptionFilter
 0x1400ef408 UnhandledExceptionFilter
 0x1400ef410 RtlVirtualUnwind
 0x1400ef418 RtlCaptureContext
 0x1400ef420 GetConsoleMode
 0x1400ef428 GetConsoleCP
 0x1400ef430 SetFilePointerEx
 0x1400ef438 GetStartupInfoW
 0x1400ef440 InitOnceExecuteOnce
 0x1400ef448 GetFileType
 0x1400ef450 GetStdHandle
 0x1400ef458 GetTimeZoneInformation
 0x1400ef460 GetOEMCP
 0x1400ef468 GetACP
 0x1400ef470 IsValidCodePage
 0x1400ef478 GetModuleHandleExW
 0x1400ef480 IsProcessorFeaturePresent
 0x1400ef488 InitializeCriticalSectionAndSpinCount
 0x1400ef490 RtlUnwindEx
 0x1400ef498 RtlLookupFunctionEntry
 0x1400ef4a0 RaiseException
 0x1400ef4a8 lstrcmpA
 0x1400ef4b0 CloseHandle
 0x1400ef4b8 GetLastError
 0x1400ef4c0 CreateFileW
 0x1400ef4c8 ReadFile
 0x1400ef4d0 WriteFile
 0x1400ef4d8 GetFileSize
 0x1400ef4e0 MultiByteToWideChar
 0x1400ef4e8 CreateFileA
 0x1400ef4f0 RtlPcToFileHeader
 0x1400ef4f8 GetCommandLineW
 0x1400ef500 LoadLibraryExW
 0x1400ef508 ExitThread
 0x1400ef510 GetCPInfo
 0x1400ef518 GetLocaleInfoEx
 0x1400ef520 InitializeCriticalSectionEx
 0x1400ef528 DecodePointer
 0x1400ef530 EncodePointer
 0x1400ef538 GetStringTypeW
 0x1400ef540 SetEnvironmentVariableA
USER32.dll
 0x1400ef5b8 wsprintfW
 0x1400ef5c0 GetDC
 0x1400ef5c8 GetWindow
 0x1400ef5d0 GetWindowTextW
 0x1400ef5d8 GetSystemMetrics
 0x1400ef5e0 GetWindowThreadProcessId
 0x1400ef5e8 GetTopWindow
 0x1400ef5f0 wsprintfA
ADVAPI32.dll
 0x1400ef000 GetUserNameW
SHLWAPI.dll
 0x1400ef598 PathStripPathA
 0x1400ef5a0 PathFindExtensionW
 0x1400ef5a8 StrCmpIW
SHELL32.dll
 0x1400ef570 SHGetKnownFolderPath
 0x1400ef578 ShellExecuteW
 0x1400ef580 SHGetFolderPathW
 0x1400ef588 SHGetFolderPathA
ole32.dll
 0x1400ef6a0 CoUninitialize
 0x1400ef6a8 CoInitializeSecurity
 0x1400ef6b0 CoInitializeEx
 0x1400ef6b8 CoSetProxyBlanket
 0x1400ef6c0 CoCreateInstance
OLEAUT32.dll
 0x1400ef550 SysAllocString
 0x1400ef558 VariantClear
 0x1400ef560 SysFreeString
crypt.dll
 0x1400ef600 BCryptOpenAlgorithmProvider
 0x1400ef608 BCryptSetProperty
 0x1400ef610 BCryptDecrypt
 0x1400ef618 BCryptCloseAlgorithmProvider
 0x1400ef620 BCryptGenerateSymmetricKey
CRYPT32.dll
 0x1400ef010 CryptUnprotectData
 0x1400ef018 CryptStringToBinaryA
GDI32.dll
 0x1400ef028 CreateCompatibleDC
 0x1400ef030 SelectObject
 0x1400ef038 DeleteObject
 0x1400ef040 CreateCompatibleBitmap
 0x1400ef048 BitBlt
gdiplus.dll
 0x1400ef630 GdipSaveImageToFile
 0x1400ef638 GdipGetImageEncoders
 0x1400ef640 GdipCloneImage
 0x1400ef648 GdipDisposeImage
 0x1400ef650 GdipGetImageEncodersSize
 0x1400ef658 GdiplusStartup
 0x1400ef660 GdipFree
 0x1400ef668 GdipAlloc
 0x1400ef670 GdipCreateBitmapFromHBITMAP
 0x1400ef678 GdiplusShutdown
msi.dll
 0x1400ef688 None
 0x1400ef690 None

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure