General
-
Target
SWIFT IMG_2022082__000021001.pdf.exe
-
Size
22KB
-
Sample
220824-qacneadfgj
-
MD5
20a84bfdd16cd3e1b6849ea1ea9c4d0a
-
SHA1
66082f545e8c54c3574aa21c09cc2cafeddc6c59
-
SHA256
a68672b1ebb95bb719b551cbc3b72c53d5e256004c519039dc02649ff166b4da
-
SHA512
120d7792ccf28a54b59e62e7e592facd4c7b5247978b6224694aa9be53a36bfb9b258feee87148f750b44d8359b699acb6176f5e8bce9d302a7c1d17bb84e5c8
-
SSDEEP
192:2f+zZKZFq3WFjLpeBYY8zyfCCZtdT4NYHefn3Z2FT9TDvtAE230ZckEDt3ECJ:TzUZVFYBt8z3C2+Hef4ddBZA0Zva0C
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT IMG_2022082__000021001.pdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SWIFT IMG_2022082__000021001.pdf.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
SWIFT IMG_2022082__000021001.pdf.exe
-
Size
22KB
-
MD5
20a84bfdd16cd3e1b6849ea1ea9c4d0a
-
SHA1
66082f545e8c54c3574aa21c09cc2cafeddc6c59
-
SHA256
a68672b1ebb95bb719b551cbc3b72c53d5e256004c519039dc02649ff166b4da
-
SHA512
120d7792ccf28a54b59e62e7e592facd4c7b5247978b6224694aa9be53a36bfb9b258feee87148f750b44d8359b699acb6176f5e8bce9d302a7c1d17bb84e5c8
-
SSDEEP
192:2f+zZKZFq3WFjLpeBYY8zyfCCZtdT4NYHefn3Z2FT9TDvtAE230ZckEDt3ECJ:TzUZVFYBt8z3C2+Hef4ddBZA0Zva0C
-
StormKitty payload
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-