Swifti

By GoldSparrow in Trojans

Threat Scorecard

Popularity Rank: 2,510
Threat Level: 90 % (High)
Infected Computers: 62,264
First Seen: February 12, 2015
Last Seen: December 23, 2025
OS(es) Affected: Windows

Swifti is a Trojan infection that has been linked to a recently uncovered vulnerability in Adobe Flash Player. The main purpose of Swifti is to distribute adware and to expand a botnet that would include the infected computer. Although Swifti is fairly generic, the Flash Player vulnerability associated with Swifti has garnered quite a bit of attention due to its potential for exploitation.

The Flash Vulnerability Linked to Swifti

An exploit kit known as Angler Exploit Kit has been using a zero-day flaw in Flash Player to distribute the Swifti Trojan. Angler is the successor of the infamous Black Hole Exploit Kit, which met its demise in 2014. Malware analysts were alarmed when they uncovered an Angler variant that exploits three flaws in Flash Player, of which only two had been patched by Adobe. This has made computers vulnerable to these attacks when exposed to threatening content.

Why Flash has been Targeted in these Types of Attacks

Flash and other third-party platforms (such as Java) are common targets for threat attacks and exploit kits. There are several reasons for this. A crucial one is that Flash runs in all popular Web browsers and is also available in different operating systems. This means that threats that are distributed using Flash vulnerabilities (such as Swifti) may reach a wider swath of victims by exploiting Flash than by exploiting a specific Web browser or operating system. The fact that Swifti is being distributed using a zero-day exploit has made these infections particularly alarming. Swifti is not especially threatening or harmful. In fact, Swifti has been around in some variant or another since 2009, with its last update occurring in 2015. However, the distribution method and exploits used to deliver Swifti via exploit kits have caught the attention of PC security researchers and increased the profile of the Swifti Trojan.

Characteristics of Swifti and Security Issues Associated with this Trojan’s Distribution

The exploit that is being used to distribute Swifti may affect only specific operating systems and Web browsers. The exploit associated with Swifti may be used to install this Trojan on computers using Windows XP combined with Internet Explorer 6 or 8, Windows 7 with Internet Explorer 8, Windows 8 with Internet Explorer 10, and the Windows8-RT-KB3008925-x86 update. In the specific variant of Angler that has been analyzed, Windows 8.1 and Google Chrome are not affected by this exploit. However, it is highly likely that Angler may be upgraded in future releases to target a wider variety of operating systems and Web browsers with this vulnerability. A patch for this vulnerability has not yet been released, making computer users vulnerable to Swifti infections.

Other Threats Associated with Swifti

Swifti is not the only threat infection being distributed using this exploit. Another threat associated with these attacks is known as Bedep. This threat infection is a distribution botnet that may then be used to deliver multiple threat infections to the victim's computer. Bedep is being used to install threats that manipulate advertisement networks to make it seem as if the computer users has clicked or viewed multiple advertisements in order to generate revenue. This type of advertisement fraud is a typical way of generating revenue at the expense of computer users. Malware researchers consider that the exploit associated with Swifti and this other threat infection is a severe threat. This is not due, in fact, to the strength or destructive potential of the attack, but rather to the widespread use of Flash and the lack of a patch.

Analysis Report

General information

Family Name: Trojan.Coinminer.GC
Signature status: No Signature

Known Samples

MD5: 8934c976622d58b548f472a9b68d8061
SHA1: 14e2803c72c33e97b7916022b3ee6873a9656006
File Size: 6.42 MB, 6423552 bytes
MD5: c94f7a70d34265d1ae66b99fb598f8c3
SHA1: 00f19158246bd1b139c6fab634c32f25a89138f9
File Size: 6.45 MB, 6447616 bytes
MD5: 288a418f9f84a93c147cf803be4c8aed
SHA1: 89c932603846bdbea42a84a74fa2aa6007cd023f
File Size: 726.53 KB, 726528 bytes
MD5: da6f69730b8a44bf5fb72c9b9095be5b
SHA1: b688632bfa61da1cea0f199d81d4b41653d0136e
SHA256: 0157EA580E1B02A3ECC9C1248C49C33DE627856B1CADDDD69CBEB96F84A6AFD3
File Size: 8.00 MB, 7995904 bytes
MD5: 43cfb1f5b39bf96d2ac94c37e1a8c1a6
SHA1: 23047ec8c185fe0905cb7c3cb345a03a011f82b8
SHA256: 8918BE81B8122115258AA3E2162DE3455D0C038BAE93AA2C0333B62F6A6A1503
File Size: 6.40 MB, 6397440 bytes
Show More
MD5: 5bc476954f90a49ac955a0df4ff49055
SHA1: 0ce6bbb4e871442a6e645cfd00e263e8e97b18f9
SHA256: 8338F27DB8F529134F14BE9A04325B2F3F8B240256184AC99509E5A777563959
File Size: 2.45 MB, 2447848 bytes
MD5: facbb6c38a04f3fe66e912181817e0a5
SHA1: 965a259307ceab1af4e0b8f51b2a5d95600cb024
SHA256: 686A15DB21B6BB72666C420F1A8CDF76F6AB2F2CEE0D38655F383B43320FA288
File Size: 2.15 MB, 2152960 bytes
MD5: a63eb45668a03017e572c15e7c13b7f6
SHA1: 0dbb035171ac5767fa88c88be09d1f81c4b5f4d6
SHA256: 3028A7E7EC34C8A1BBD5568CE16205602EDD350564E771667399B0BA793FEE8B
File Size: 6.34 MB, 6341632 bytes
MD5: 1e853fda8400d0ff5928545505f728a8
SHA1: 7a987116d89df3adcca26e8e34c3dab808fe8faa
SHA256: A2A3931556642879FF41FE453E60CCFA7BF456DD8C07AD56A0EFEC3B9C07249B
File Size: 6.44 MB, 6435690 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has been packed
  • File has TLS information
  • File is 64-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
Show More
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name
  • Microsoft Corporation
  • www.microsoft.com
  • www.SearchFilterHost.com
File Description
  • Host Process for Windows Services
  • Microsoft Realtime Network lnpsection
  • Runtime Broker
  • Windows Search Filter Host
File Version
  • 12.3.0
  • 10.0.19041.5794 (WinBuild.160101.0800)
  • 6.23.4.0
  • 6.22.2
Internal Name svchost.exe
Legal Copyright
  • Copyright (C) 1975-2024 microsoft.com
  • Copyright (C) 1990-2025 google.com
  • Copyright (C) 2016-2025 Realtime Network lnpsection
  • © Microsoft Corporation. All rights reserved.
Original Filename
  • PythonInstaler64.exe
  • Realtime Networking.exe
  • runtimebroker.exe
  • svchost.exe
Product Name
  • Microsoft® Windows® Operating System
  • Realtime Network lnpsection
  • RuntimeBroker
  • Windows Search Filter Host
Product Version
  • 12.3.0
  • 10.0.19041.5794
  • 6.23.4.0
  • 6.22.2

Digital Signatures

Signer Root Status
Microsoft Code Signing PCA Microsoft Code Signing PCA Self Signed

File Traits

  • 2+ executable sections
  • fptable
  • GetConsoleWindow
  • HighEntropy
  • No Version Info
  • packed
  • x64

Block Information

Total Blocks: 17,177
Potentially Malicious Blocks: 661
Whitelisted Blocks: 13,894
Unknown Blocks: 2,622

Visual Map

0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 ? 0 0 ? 0 0 ? ? 0 0 ? 0 0 0 ? 0 ? 0 0 ? 0 0 0 ? 0 ? ? 0 ? 0 0 ? 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 ? 0 0 1 0 0 0 0 0 0 0 ? 0 ? ? 0 ? 0 0 ? 0 0 0 0 0 0 0 ? 0 0 ? 0 ? 0 ? 0 0 0 0 0 0 0 0 0 ? ? ? ? 0 ? 0 ? 0 ? ? ? x ? ? ? x ? ? 0 ? ? ? 0 x ? ? 0 0 0 0 0 ? x ? ? 0 x ? ? 0 0 0 0 ? 0 0 0 0 0 ? 0 ? ? ? 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 ? ? ? ? 0 0 0 0 ? 0 0 0 0 ? ? ? 0 x 0 0 0 ? 0 0 ? ? x 0 0 0 0 0 ? ? x 0 0 ? x ? ? x ? ? 0 0 ? 0 0 0 ? 0 0 x ? ? ? ? ? ? 1 x ? 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 ? x 0 0 0 0 ? 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 1 0 0 0 0 0 0 0 0 0 ? 0 1 0 ? 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? ? ? ? ? ? ? ? ? x 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? x 0 0 0 0 0 ? ? ? ? ? ? ? 0 0 0 ? ? ? ? ? 0 0 0 0 1 0 0 x ? ? 0 0 0 0 0 0 0 0 0 0 x 0 0 0 ? 0 0 0 0 0 ? 0 0 0 0 ? 0 0 0 0 0 0 1 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 ? x ? ? x ? 1 0 0 ? 0 0 0 ? 0 0 0 0 0 0 0 0 0 ? x x 0 0 0 0 0 0 0 x 0 x x x ? 0 0 x x 0 x 0 0 0 ? ? ? ? ? 0 ? x 0 ? ? 0 0 0 ? ? ? 0 x ? ? ? ? ? x 0 ? 0 0 0 ? ? 0 ? ? 0 0 0 0 ? ? ? ? ? ? ? ? ? 0 0 x 0 ? x x 0 0 ? 0 ? ? ? 0 ? 0 ? x 0 ? ? 0 0 ? ? ? 0 ? ? ? ? ? ? ? ? ? ? ? 0 0 0 0 0 0 0 ? 0 ? ? 0 0 0 0 1 0 ? 0 0 1 ? 0 0 0 0 0 0 1 ? 0 ? ? 0 0 0 0 ? 0 0 0 0 ? ? ? ? ? ? ? 0 ? 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 x ? ? ? 0 x 0 0 ? ? 0 0 ? ? ? 0 0 0 0 0 0 0 0 ? x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 ? 0 ? x x ? ? 0 ? ? 0 x x ? 0 ? ? ? ? ? ? 0 ? 0 ? ? x ? ? 0 ? x ? ? 0 ? x ? 0 ? ? ? ? 1 x 0 0 0 0 0 0 0 0 ? 0 0 0 0 ? x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 x x x ? ? ? ? ? ? ? x ? 0 0 0 0 0 0 0 0 ? 0 ? ? x ? 0 0 0 x ? ? ? ? x x 0 ? ? ? 0 ? ? 0 ? 0 ? 0 0 0 0 0 0 0 0 0 0 0 ? ? ? x 0 0 0 0 x ? ? ? ? ? 0 0 0 0 0 0 ? 0 ? ? ? ? ? 0 0 0 0 1 0 0 0 0 ? 0 0 ? 0 0 0 0 0 0 0 0 0 ? ? 0 0 1 0 x x ? x 0 ? 0 0 x 0 ? 0 ? ? 0 0 0 ? x 0 0 x x 0 ? ? 0 ? 0 0 0 x x x 0 ? ? x ? ? 0 ? ? 0 0 ? 0 0 ? 0 0 0 0 x x 0 ? ? 0 0 0 0 0 0 0 0 0 0 x 1 ? ? ? 0 ? 0 0 0 0 x 0 0 0 0 0 ? 0 0 0 0 0 ? 0 ? 0 x 0 ? ? ? ? x x ? ? ? 0 0 0 ? ? ? 0 x 0 0 ? 0 0 x x ? ? ? ? 0 ? ? 0 ? x 0 ? 0 ? 0 ? ? 0 0 0 x ? ? 0 ? ? ? 0 ? ? 0 0 0 0 0 0 0 0 ? ? ? 0 0 0 ? ? 0 ? ? ? x 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 ? x x ? x ? ? 0 ? ? ? ? ? ? x ? ? ? ? x 0 0 x ? ? ? ? 0 0 0 0 1 0 0 ? ? ? x ? ? 0 ? ? 0 0 0 0 ? ? ? 0 ? ? 0 ? ? ? ? ? 0 ? ? ? 0 ? ? 0 ? ? ? ? 0 0 ? 0 ? 0 0 0 ? ? ? ? 0 ? ? 0 ? 0 ? ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x ? 0 0 0 0 0 0 0 x 0 0 ? 0 0 0 ? 0 x 0 0 x ? ? 0 ? ? ? ? 0 ? 0 ? 0 0 0 ? x x x 0 0 ? x x 1 ? ? ? ? 0 ? ? 0 0 0 ? 0 x 0 ? ? 0 0 0 0 0 0 ? ? 0 0 ? 0 x x x ? ? 0 ? 0 x x 0 1 x 0 0 x 0 0 0 ? 0 0 0 ? 0 x x ? 1 0 0 x ? 0 ? ? ? ? ? x 0 ? ? 0 ? 0 0 0 0 1 ? 0 0 0 x ? 0 0 ? ? x 0 0 ? ? 0 0 ? x 0 0 ? ? 0 ? ? ? x ? x 0 ? ? ? x ? ? ? ? ? 1 x 0 x ? ? ? ? ? 1 ? ? 0 0 ? ? 0 ? 0 0 ? 0 0 0 x x 0 0 ? x 0 0 ? ? ? x ? ? ? ? ? ? x 0 0 ? ? ? ? 0 0 ? ? ? ? ? ? ? ? ? ? ? 0 x x x ? ? ? ? 0 0 0 ? 0 0 0 0 0 0 1 0 0 ? x 0 ? 0 0 0 0 0 ? 0 x x ? ? 0 x 0 ? ? ? 0 ? 0 x x ? ? 0 x 0 ? ? 0 x x ? ? 0 x 0 ? 0 ? 0 0 0 x ? x ? 0 x 0 0 ? 0 ? ? 0 0 0 0 0 ? ? 0 0 0 0 x 0 0 0 0 1 0 0 0 ? 0 ? ? 0 ? ? ? ? ? 0 0 0 0 0 0 0 ? 0 0 ? ? ? ? 0 0 0 0 x 0 0 x 0 ? x ? ? ? ? ? ? ? ? ? 0 ? ? 0 0 0 ? ? ? 0 ? ? ? ? 0 0 0 0 0 1 0 0 x ? ? ? ? ? ? ? x ? ? ? ? ? 0 ? 0 ? x ? 0 0 1 ? 0 0 0 0 0 0 0 0 ? ? 0 0 0 0 0 ? ? 0 0 0 0 0 ? ? ? ? ? ? 0 0 0 1 0 ? ? x ? ? ? 0 0 ? ? ? ? ? ? 0 ? 0 ? ? ? 1 ? ? ? ? ? 0 ? ? ? ? ? x ? 0 ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? ? ? 0 ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? ? x ? 0 ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? ? x ? 0 ? ? ? ? ? ? ? ? ? ? 0 x ? ? ? ? ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? ? 0 ? 0 ? 0 ? 0 ? 0 0 0 ? ? ? 0 ? ? ? ? ? ? ? ? ? 0 ? 0 ? 0 ? ? 0 ? ? 0 0 0 0 0 0 ? x ? ? ? 0 0 1 0 0 1 ? 0 ? 0 ? ? ? ? ? ? ? ? 0 ? ? ? ? ? ? 0 x ? 0 0 0 0 ? 0 ? ? ? ? ? x
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Agent.BR
  • Agent.KFS
  • Agent.LKFB
  • ClipBanker.AY
  • Downloader.Agent.NBF
Show More
  • GameHack.GH
  • Gamehack.GYF
  • KillAV.X

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAlpcConnectPort
  • ntdll.dll!NtAlpcSetInformation
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtAssociateWaitCompletionPacket
  • ntdll.dll!NtClose
  • ntdll.dll!NtConnectPort
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateIoCompletion
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtCreateSemaphore
Show More
  • ntdll.dll!NtCreateTimer2
  • ntdll.dll!NtCreateWaitCompletionPacket
  • ntdll.dll!NtCreateWorkerFactory
  • ntdll.dll!NtDeviceIoControlFile
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQuerySecurityObject
  • ntdll.dll!NtQuerySystemInformation
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadRequestData
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtRequestWaitReplyPort
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationThread
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWriteFile
  • ntdll.dll!NtWriteVirtualMemory
  • UNKNOWN
  • win32u.dll!NtUserGetKeyboardLayout
  • win32u.dll!NtUserGetThreadState
User Data Access
  • GetComputerName
  • GetUserObjectInformation
Anti Debug
  • CheckRemoteDebuggerPresent
  • IsDebuggerPresent
Service Control
  • StartServiceCtrlDispatcher
Network Winsock2
  • WSAStartup
Network Winsock
  • closesocket
  • socket
Network Info Queried
  • GetAdaptersAddresses

Related Posts

Trending

Most Viewed

Loading...