top title background image
flash

SWIFT05062023.exe

Status: finished
Submission Time: 2023-06-06 17:21:10 +02:00
Malicious
Trojan
Spyware
Evader
AgentTesla

Comments

Tags

  • exe

Details

  • Analysis ID:
    882717
  • API (Web) ID:
    1249696
  • Analysis Started:
    2023-06-06 17:25:56 +02:00
  • Analysis Finished:
    2023-06-06 17:36:02 +02:00
  • MD5:
    b7475f585b317b4cdb0f385f147e635d
  • SHA1:
    c88c9416ffc3d97ac9ed1aeed6558c6f1b610207
  • SHA256:
    46887ad939b1f8d5e6588548aef4ebcbb3e924df26efc74ee5ddcdad4a23ed20
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 16/71

IPs

IP Country Detection
162.159.137.232
United States

Domains

Name IP Detection
discord.com
162.159.137.232

URLs

Name Detection
https://discord.com
https://discord.com/api/webhooks/1114977540709289984/k4SQohEZgHj3IRvaJBioKCVlTv-1sy0NPHEWl2GHdoz5JLv
https://discord.com/api/webhooks/1114977540709289984/k4SQohEZgHj3IRvaJBioKCVlTv-1sy0NPHEWl2GHdoz5JLvX6trIkig77Yg2Nm1avTr9
Click to see the 8 hidden entries
https://cdn.discordapp.com/attachments/1114977416134279200/1115663130656251924/user-226546_2023-06-
http://discord.com
https://discord.comD8
https://discord.com4
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
https://cdn.discordapp.com/attachments/1114977416134279200/1115663127888011334/user-226546_2023-06-
https://media.discordapp.net/attachments/1114977416134279200/1115663130656251924/user-226546_2023-0
https://media.discordapp.net/attachments/1114977416134279200/1115663127888011334/user-226546_2023-0

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SWIFT05062023.exe.log
CSV text
#
C:\Users\user\AppData\Roaming\53sr1wwi.fo3\Chrome\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3038005, file counter 10, database pages 7, 1st free page 5, free pages 2, cookie 0x13, schema 4, UTF-8, version-valid-for 10
#