General
-
Target
Swift.exe
-
Size
20.5MB
-
Sample
250415-ygfmmszpv3
-
MD5
70f9de7c18e51b892285bff4c2fa8785
-
SHA1
0d8e30d948b30eab3039bea5e438fbad63714a82
-
SHA256
8a30ebc969b8b7048eeff42b5c3c28ce294f3bc845531bf6f1c9269c8ef21ee6
-
SHA512
90ab288fc847e900a330e5063bced989a68529f13fe0127355d3f3686063afaa19f3580295c9d657144c803b10a2343ef360ccb7ba894ab3f6d8591c5ec9a50d
-
SSDEEP
393216:FNvARqkv+0mXvPU/KzaNYg1XxVqOzP5e0AuN/kdryhbBFA4I:nqHMG0ayg1hEU40pMhyhbBF4
Behavioral task
behavioral1
Sample
Swift.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
Swift.exe
Resource
win11-20250410-en
Malware Config
Targets
-
-
Target
Swift.exe
-
Size
20.5MB
-
MD5
70f9de7c18e51b892285bff4c2fa8785
-
SHA1
0d8e30d948b30eab3039bea5e438fbad63714a82
-
SHA256
8a30ebc969b8b7048eeff42b5c3c28ce294f3bc845531bf6f1c9269c8ef21ee6
-
SHA512
90ab288fc847e900a330e5063bced989a68529f13fe0127355d3f3686063afaa19f3580295c9d657144c803b10a2343ef360ccb7ba894ab3f6d8591c5ec9a50d
-
SSDEEP
393216:FNvARqkv+0mXvPU/KzaNYg1XxVqOzP5e0AuN/kdryhbBFA4I:nqHMG0ayg1hEU40pMhyhbBF4
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Checks whether UAC is enabled
-
Enumerates processes with tasklist
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-