Multiple e-mail campaigns have been observed using spoofed email addresses that use the legitimacy of SWIFT to successfully target unsuspecting victims. The emails contain malicious links to zip files which contain malicious VBScripts, as well as malicious files containing backdoors.
The emails are either sent from a spoofed email address or use the subject of SWIFT transactions.
Collective IoCs are given below.
Indicators of Compromise
IP(s) / Hostname(s)
Malware Hash (MD5/SHA1/SH256)
Block the threat indicators at their respective controls.