General
-
Target
SheetRat.rar
-
Size
39.2MB
-
Sample
250222-nhpxlavphj
-
MD5
53a82e06c60cc89e51b26ee1f81f39b5
-
SHA1
3fa56ef9898f5a3ea8db83e933fb7110d4f9a51b
-
SHA256
1b1d23aa7e2fda08f8bf0edf4f8bf3a3784c73c44b47a49b739120a9d72bb826
-
SHA512
8fbc5b683297e5e386909d646aac8ac6f5104edbc368d4d8263a0508f4b38b372693804994a17f1ff0ddf3bce23a6ce545b7cd57bb5ad531c16ffb9a88e80029
-
SSDEEP
786432:pTigQyx3hnBsmfX4BxP7luhmXfSEDiMy+28vb8k5Kuzxpz1saaYAU:myx3hqwSxP7lukPSwiR+2q55pJajU
Behavioral task
behavioral1
Sample
SheetRat.rar
Resource
win10v2004-20250217-en
Malware Config
Extracted
xworm
cut-plenty.gl.at.ply.gg:18554
-
Install_directory
%AppData%
-
install_file
Microsoft Edge.exe
Targets
-
-
Target
SheetRat.rar
-
Size
39.2MB
-
MD5
53a82e06c60cc89e51b26ee1f81f39b5
-
SHA1
3fa56ef9898f5a3ea8db83e933fb7110d4f9a51b
-
SHA256
1b1d23aa7e2fda08f8bf0edf4f8bf3a3784c73c44b47a49b739120a9d72bb826
-
SHA512
8fbc5b683297e5e386909d646aac8ac6f5104edbc368d4d8263a0508f4b38b372693804994a17f1ff0ddf3bce23a6ce545b7cd57bb5ad531c16ffb9a88e80029
-
SSDEEP
786432:pTigQyx3hnBsmfX4BxP7luhmXfSEDiMy+28vb8k5Kuzxpz1saaYAU:myx3hqwSxP7lukPSwiR+2q55pJajU
-
Detect Umbral payload
-
Detect Xworm Payload
-
StormKitty payload
-
Stormkitty family
-
Umbral family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1