General

  • Target

    Swift.exe

  • Size

    20.9MB

  • Sample

    250508-jgmcvsy1fv

  • MD5

    3b08377bdab65ef27e779c45a99f5d64

  • SHA1

    6e59070140db88cddf6fd9391e174109fb19fce9

  • SHA256

    9bf3d5c9793f05de89e0c0f1aeb9e4a85c06d9c11cc6791cf952174a06097f6f

  • SHA512

    26ece42ae4f92bb9745263b060731da9420917c7a56ec8408df3d0d7943dc256f6f5ccb777706f9817c319740380fe2b900d51edc1866df750244c18f60c4e9a

  • SSDEEP

    393216:k4dVW8yUaHvFIZJe142KnonJtbn2VGqC/9pS7XnJa42wK83CaMO1sJDW:tdVP2QJevKnonJtbnBn/i7XJavOd8W

Malware Config

Targets

    • Target

      Swift.exe

    • Size

      20.9MB

    • MD5

      3b08377bdab65ef27e779c45a99f5d64

    • SHA1

      6e59070140db88cddf6fd9391e174109fb19fce9

    • SHA256

      9bf3d5c9793f05de89e0c0f1aeb9e4a85c06d9c11cc6791cf952174a06097f6f

    • SHA512

      26ece42ae4f92bb9745263b060731da9420917c7a56ec8408df3d0d7943dc256f6f5ccb777706f9817c319740380fe2b900d51edc1866df750244c18f60c4e9a

    • SSDEEP

      393216:k4dVW8yUaHvFIZJe142KnonJtbn2VGqC/9pS7XnJa42wK83CaMO1sJDW:tdVP2QJevKnonJtbnBn/i7XJavOd8W

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Network Share Discovery

      Attempt to gather information on host network.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v16

Tasks

OSZAR »