General
-
Target
PortaRAT.exe
-
Size
245KB
-
Sample
250413-1472hstm13
-
MD5
ba4075021c4e845372a110f5a2225cf2
-
SHA1
43fe5e18f3f283cff474549b0cb59991261b01ee
-
SHA256
3dff7daa21e2b7f2a6c8c3ced325c9cdbc66f8c454a669608ce14f2e643c56f1
-
SHA512
7987ffea17ce0e00a734eff468b8f4c348ae7fe29f82ad66ca77936d27225defea5753501e75f63dfe8ea961561d2525e912b36e359ff7884e08d40bdd6b7312
-
SSDEEP
3072:kRPlsVWAbFt5EO7GyMubk8kBP3jf6/FfwKDt:QcrbiWk886xwK
Behavioral task
behavioral1
Sample
PortaRAT.exe
Resource
win11-20250410-en
Malware Config
Extracted
xworm
xml-processor.gl.at.ply.gg:35117
-
Install_directory
%AppData%
-
install_file
USB.exe
Extracted
C:\Users\Admin\AppData\Local\Temp\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Targets
-
-
Target
PortaRAT.exe
-
Size
245KB
-
MD5
ba4075021c4e845372a110f5a2225cf2
-
SHA1
43fe5e18f3f283cff474549b0cb59991261b01ee
-
SHA256
3dff7daa21e2b7f2a6c8c3ced325c9cdbc66f8c454a669608ce14f2e643c56f1
-
SHA512
7987ffea17ce0e00a734eff468b8f4c348ae7fe29f82ad66ca77936d27225defea5753501e75f63dfe8ea961561d2525e912b36e359ff7884e08d40bdd6b7312
-
SSDEEP
3072:kRPlsVWAbFt5EO7GyMubk8kBP3jf6/FfwKDt:QcrbiWk886xwK
-
Detect Xworm Payload
-
Wannacry family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Executes dropped EXE
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1