General
-
Target
Swift Copy.exe
-
Size
182KB
-
Sample
221028-qsj57sgbfn
-
MD5
50d9d10506adb6700bb3e0df6d17a5be
-
SHA1
e11b8c33ea7fa0618fbca8ef6828c2081835e944
-
SHA256
b8d864b09ba66e1cff809b9700c8ef000b2d4ccbaba47c5da69bb7cf44a28795
-
SHA512
07a2e25c29ec2c6f1f3f9e51780c0db622e69cd9a56e437c23a5258425b71da7207698f07b9310f9e1ad5fb27a2628d14bd60903bdb81c8db8c6e09a89464593
-
SSDEEP
3072:qUJoFfWzzl+cSMGGKeoyShiKF9nc+PAukezQLVqM+ZPjZag0dWvsqDbKAnrE7t6D:qweEpGaobF9nBAukeELV50lagLvn+Ao+
Static task
static1
Behavioral task
behavioral1
Sample
Swift Copy.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Swift Copy.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
lokibot
http://208.67.105.161/starmoney/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Swift Copy.exe
-
Size
182KB
-
MD5
50d9d10506adb6700bb3e0df6d17a5be
-
SHA1
e11b8c33ea7fa0618fbca8ef6828c2081835e944
-
SHA256
b8d864b09ba66e1cff809b9700c8ef000b2d4ccbaba47c5da69bb7cf44a28795
-
SHA512
07a2e25c29ec2c6f1f3f9e51780c0db622e69cd9a56e437c23a5258425b71da7207698f07b9310f9e1ad5fb27a2628d14bd60903bdb81c8db8c6e09a89464593
-
SSDEEP
3072:qUJoFfWzzl+cSMGGKeoyShiKF9nc+PAukezQLVqM+ZPjZag0dWvsqDbKAnrE7t6D:qweEpGaobF9nBAukeELV50lagLvn+Ao+
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-