General
-
Target
SWIFT Transfer (103) 022FT102211200045.exe
-
Size
808KB
-
Sample
221121-184vnada7y
-
MD5
2dcae6df92afaf02c7b46ab27b15a2a9
-
SHA1
812ba37bf384e0bea85097441ccd024f683fa1c6
-
SHA256
0d68d580e0b5eab78723411ce4a8a0cca360d1495951dde7243989044d47d5cc
-
SHA512
d2c67f9180d94c156a048e5f6694afcfaa53f99f4d6266cb3011cc23cb47523fa9ec7bbaf4fa4120d79270e06042cc4fb5a2b1970411cef03c495cf5b77475e2
-
SSDEEP
24576:yr18+L74mBfNUstzow3r8JNDG40SgSatPpzguTsu:yrLIid//L
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT Transfer (103) 022FT102211200045.exe
Resource
win7-20221111-en
Malware Config
Extracted
formbook
n2hm
XCeG4IxNKbAl
YzJWbnC+El84nA==
KAJcdmP8yEcO5LXPCFF42Wfb
I+J+xYO95GJQWVU=
GtgxPPv3FmQmhw==
Og9NYF4xEl+j7vGTR93xvg==
506Cg07bsT0G6yK+A96H0h35V+JLkwI=
wAYXFN+pSFIXgQ==
ijzLI/f+FmQmhw==
UfT2PweNm+w8
GQWVw5aZnfF/kS5e
30BKYjua9zcA7gAwsPUngLnjyrBNEgo=
AM65OrmyFmQmhw==
VSlTVxISZ4J/kS5e
GGKj6K33SRh6e0/YzT5nQGlK5CXRqw==
B9H98cUUfX+AWOqiTA==
MxVffWOIoVnM37zrd2sTaOY=
z6bxCgG/mGhR7oDzQA==
pQgSLSRi6AK3M/PdArpX
6rRRsYuSnXx/kS5e
tJRNn0ias3Yw
7c4NEQLSp/R/kS5e
TJmwu5Aa/IuRHtoXXQ==
TLoRUygkiJQE5GoRji0aff0=
Y83qB/DsQFYeZzahj6pYqw==
Bup2q3PHFmQmhw==
cDTa78WEWaYMdoDdArpX
28Rw4MRMnjT52raaTR5KhtMJYa8=
WydpZS7v/4XubCZuhkdxP2OAKdyK68u6
B+osKudaL8yAV/K/VAH3T+Q=
qVz9Y0QD3TGeM/PdArpX
+r49VzlFXLpFegdyc4q5ow==
gsXk990afa1hl6ATTA==
XkblOQWRaet/kS5e
4TNPSf2OcfNk9cfPCFF42Wfb
NaIIUEoRdKYr
ITSqBfn5FmQmhw==
KPRUmWnqxVE0hERFtyo=
VLzd1qk6E5wNcQ49KnmhAoT3Ok5roMK4kQ==
65jM2pKJ8EIST04=
I3+JoYVgYgDiv3O15Ntvw0On/sJroMK4kQ==
C+YhNzH20aCpy8MqVw==
yBZRl4HdPn+RHtoXXQ==
pGQATg0mMfntSBR9c4q5ow==
YUKFixIRdKYr
Hv+C4cZTOMAKV+/dArpX
MVW+PJpyCVA=
FX2AJYBFYbgk
/cX1CsjSpvU+
fWoThWagDVhBHt4yMjWQifM=
/vCd69xrS8QwuCt/yD8=
GvAsSzbCRxplG582TKzVug==
S6zlGfJ6DFc4TBNUvig=
k0z/QwnTpfR/kS5e
KPofKfkPcoRqxowFuWWNhvM=
Xrj+JvENc3yBln4OUw==
ScTatpYj/IKRHtoXXQ==
vLRdwbLyTpzFn+dAR93xvg==
mLTJe/eFp2kxl69W
Cbr5/dRQbio2P/e8ay0aff0=
xooviWn51V7DI7mMOwWT4lCIJUlf
l0t7fTmLqSCAuIYIVA==
06xFejwYMSkbfETTiNT21O0=
bWzTF+1nS4kxlydW
madamkikkiey.net
Targets
-
-
Target
SWIFT Transfer (103) 022FT102211200045.exe
-
Size
808KB
-
MD5
2dcae6df92afaf02c7b46ab27b15a2a9
-
SHA1
812ba37bf384e0bea85097441ccd024f683fa1c6
-
SHA256
0d68d580e0b5eab78723411ce4a8a0cca360d1495951dde7243989044d47d5cc
-
SHA512
d2c67f9180d94c156a048e5f6694afcfaa53f99f4d6266cb3011cc23cb47523fa9ec7bbaf4fa4120d79270e06042cc4fb5a2b1970411cef03c495cf5b77475e2
-
SSDEEP
24576:yr18+L74mBfNUstzow3r8JNDG40SgSatPpzguTsu:yrLIid//L
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-