General
-
Target
PortaRAT.exe
-
Size
245KB
-
Sample
250413-1z4tasvwaw
-
MD5
ba4075021c4e845372a110f5a2225cf2
-
SHA1
43fe5e18f3f283cff474549b0cb59991261b01ee
-
SHA256
3dff7daa21e2b7f2a6c8c3ced325c9cdbc66f8c454a669608ce14f2e643c56f1
-
SHA512
7987ffea17ce0e00a734eff468b8f4c348ae7fe29f82ad66ca77936d27225defea5753501e75f63dfe8ea961561d2525e912b36e359ff7884e08d40bdd6b7312
-
SSDEEP
3072:kRPlsVWAbFt5EO7GyMubk8kBP3jf6/FfwKDt:QcrbiWk886xwK
Behavioral task
behavioral1
Sample
PortaRAT.exe
Resource
win10v2004-20250410-en
Malware Config
Extracted
xworm
xml-processor.gl.at.ply.gg:35117
-
Install_directory
%AppData%
-
install_file
USB.exe
Extracted
C:\Users\Admin\AppData\Local\Temp\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
PortaRAT.exe
-
Size
245KB
-
MD5
ba4075021c4e845372a110f5a2225cf2
-
SHA1
43fe5e18f3f283cff474549b0cb59991261b01ee
-
SHA256
3dff7daa21e2b7f2a6c8c3ced325c9cdbc66f8c454a669608ce14f2e643c56f1
-
SHA512
7987ffea17ce0e00a734eff468b8f4c348ae7fe29f82ad66ca77936d27225defea5753501e75f63dfe8ea961561d2525e912b36e359ff7884e08d40bdd6b7312
-
SSDEEP
3072:kRPlsVWAbFt5EO7GyMubk8kBP3jf6/FfwKDt:QcrbiWk886xwK
-
Detect Xworm Payload
-
Wannacry family
-
Xworm family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
1File Deletion
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1