General

  • Target

    SWAV2.zip

  • Size

    6.7MB

  • Sample

    250123-rjysnstmfm

  • MD5

    208d379e5f8f7d8d05f0cb2ed034a1d0

  • SHA1

    de3f4eb66fea90972f4812636ecda1e9a88e23af

  • SHA256

    05c23da20c882d0070b1dcaa7ac3d05bfce04a4af53bca1753b902fa4239e6f0

  • SHA512

    99fb344b620ca0944edfd9c2092bbfcfe7c8fefda6c46f712656a7a0d23a24aac9f352f9d806b6a24cf49af7de4e15c63e5dba0db75d6926a4c46068cf716f70

  • SSDEEP

    196608:PJ6oiYEZietNBVmDHHzgfJJ1SFT5JogBzxv7M:PBirZiULVmDHERHSFdJo2M

Malware Config

Targets

    • Target

      SWA V2.exe

    • Size

      5.5MB

    • MD5

      ce45d4467d253fcaf5a937a85dbf8c5e

    • SHA1

      f58ef5bedc2cd2a1609102f44d09f27b827702c1

    • SHA256

      1b374a626da8d4ee3816742e32b96f97f9dbc2822e1648e3c0bbc56a653e8e13

    • SHA512

      ffa8b1ab3659b089bef4e0928861dc36e17a66c55b271bf367bb730c51ddd8edd463199611d92e39e0b2a8e2ede50d15e4d29c9d540195006b9013da85fa11b8

    • SSDEEP

      98304:Js+xoTSHvE7ZlqnioOi8cn3K2O8k6JFjE9X0Zd0GKApCByE9fyr:JnxvIZlqidiDOK69kZdxK1yD

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Detected potential entity reuse from brand STEAM.

MITRE ATT&CK Enterprise v15

Tasks