General

  • Target

    Swift.exe

  • Size

    20.5MB

  • Sample

    250415-ygfmmszpv3

  • MD5

    70f9de7c18e51b892285bff4c2fa8785

  • SHA1

    0d8e30d948b30eab3039bea5e438fbad63714a82

  • SHA256

    8a30ebc969b8b7048eeff42b5c3c28ce294f3bc845531bf6f1c9269c8ef21ee6

  • SHA512

    90ab288fc847e900a330e5063bced989a68529f13fe0127355d3f3686063afaa19f3580295c9d657144c803b10a2343ef360ccb7ba894ab3f6d8591c5ec9a50d

  • SSDEEP

    393216:FNvARqkv+0mXvPU/KzaNYg1XxVqOzP5e0AuN/kdryhbBFA4I:nqHMG0ayg1hEU40pMhyhbBF4

Malware Config

Targets

    • Target

      Swift.exe

    • Size

      20.5MB

    • MD5

      70f9de7c18e51b892285bff4c2fa8785

    • SHA1

      0d8e30d948b30eab3039bea5e438fbad63714a82

    • SHA256

      8a30ebc969b8b7048eeff42b5c3c28ce294f3bc845531bf6f1c9269c8ef21ee6

    • SHA512

      90ab288fc847e900a330e5063bced989a68529f13fe0127355d3f3686063afaa19f3580295c9d657144c803b10a2343ef360ccb7ba894ab3f6d8591c5ec9a50d

    • SSDEEP

      393216:FNvARqkv+0mXvPU/KzaNYg1XxVqOzP5e0AuN/kdryhbBFA4I:nqHMG0ayg1hEU40pMhyhbBF4

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Network Share Discovery

      Attempt to gather information on host network.

    • Enumerates processes with tasklist

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v16

Tasks