General
-
Target
Swift.exe
-
Size
20.9MB
-
Sample
250508-jgmcvsy1fv
-
MD5
3b08377bdab65ef27e779c45a99f5d64
-
SHA1
6e59070140db88cddf6fd9391e174109fb19fce9
-
SHA256
9bf3d5c9793f05de89e0c0f1aeb9e4a85c06d9c11cc6791cf952174a06097f6f
-
SHA512
26ece42ae4f92bb9745263b060731da9420917c7a56ec8408df3d0d7943dc256f6f5ccb777706f9817c319740380fe2b900d51edc1866df750244c18f60c4e9a
-
SSDEEP
393216:k4dVW8yUaHvFIZJe142KnonJtbn2VGqC/9pS7XnJa42wK83CaMO1sJDW:tdVP2QJevKnonJtbnBn/i7XJavOd8W
Behavioral task
behavioral1
Sample
Swift.exe
Resource
win10ltsc2021-20250425-en
Malware Config
Targets
-
-
Target
Swift.exe
-
Size
20.9MB
-
MD5
3b08377bdab65ef27e779c45a99f5d64
-
SHA1
6e59070140db88cddf6fd9391e174109fb19fce9
-
SHA256
9bf3d5c9793f05de89e0c0f1aeb9e4a85c06d9c11cc6791cf952174a06097f6f
-
SHA512
26ece42ae4f92bb9745263b060731da9420917c7a56ec8408df3d0d7943dc256f6f5ccb777706f9817c319740380fe2b900d51edc1866df750244c18f60c4e9a
-
SSDEEP
393216:k4dVW8yUaHvFIZJe142KnonJtbn2VGqC/9pS7XnJa42wK83CaMO1sJDW:tdVP2QJevKnonJtbnBn/i7XJavOd8W
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Checks whether UAC is enabled
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-