MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 22340b89f926ff263bd94dbf8966b71afb1bb6c5618ecb593bc1e7b4566ece1a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SheetRAT


Vendor detections: 20


Intelligence 20 IOCs 1 YARA 20 File information Comments

SHA256 hash: 22340b89f926ff263bd94dbf8966b71afb1bb6c5618ecb593bc1e7b4566ece1a
SHA3-384 hash: 233127f49f0ebd36c2e58cbbfb9d9ba1d55091452bb383404c59bc328a0affc190e1e3b567b3f58c364ea62ccd3afb20
SHA1 hash: 935b13e683e9070305c9aa7f43bcbf348c6513c4
MD5 hash: a6c041503e8a1c81f85805f341e74a22
humanhash: montana-gee-video-finch
File name:astralfreerelease0.36.1.exe
Download: download sample
Signature SheetRAT
File size:6'389'248 bytes
First seen:2025-12-14 13:15:14 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'853 x AgentTesla, 19'780 x Formbook, 12'304 x SnakeKeylogger)
ssdeep 98304:FDDC1PD4lDqU0FL0zWL3tsUOxO/0/ZGGe0jxrinqkYtbiINtr4tu6:FqBDx18MPgGK1riFpat36
Threatray 573 similar samples on MalwareBazaar
TLSH T1B75633115298EFA3C9FFD67C4CAA6F1F06214938935541C0E7149A2AE482DF187FFB29
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter abuse_ch
Tags:exe SheetRat


Avatar
abuse_ch
SheetRAT C2:
193.161.193.99:34712

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
193.161.193.99:34712 https://threatfox.abuse.ch/ioc/1678877/

Intelligence


File Origin
# of uploads :
1
# of downloads :
136
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
astralfree_release_0.36.1.exe
Verdict:
Malicious activity
Analysis date:
2025-12-14 12:53:30 UTC
Tags:
evasion uac blankgrabber auto-reg anti-evasion auto-startup python stealer screenshot telegram xworm susp-powershell

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
asyncrat virus micro sage
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed vbnet venomrat
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-12-12T12:34:00Z UTC
Last seen:
2025-12-15T15:58:00Z UTC
Hits:
~10
Detections:
PDM:Trojan.Win32.Generic HEUR:Trojan.MSIL.Exnet.gen Backdoor.MSIL.XWorm.c Trojan-Spy.Win32.Agent.dffz HEUR:Trojan.Python.Agent.gen HEUR:Backdoor.MSIL.XWorm.gen Trojan.Win32.Dizemp.sb Trojan.Win32.Vimditator.sb Trojan.Win32.Agent.sb HEUR:Trojan-PSW.Python.Blank.gen HEUR:Backdoor.MSIL.XClient.b Backdoor.MSIL.XWorm.b Trojan-PSW.Win32.Greedy.sb Trojan-PSW.Win32.Disco.sb Trojan-PSW.MSIL.Stealer.sb Trojan-PSW.Python.Blank.sb HEUR:Trojan-Spy.MSIL.Stealer.gen Backdoor.MSIL.XWorm.a Backdoor.MSIL.Crysan.d Trojan.Python.Agent.gen
Result
Threat name:
AsyncRAT, Blank Grabber, XWorm
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Drops large PE files
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Modifies Windows Defender protection settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Potentially malicious time measurement code found
Removes signatures from Windows Defender
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses WMIC command to query system information (often done to detect virtual machines)
Yara detected AsyncRAT
Yara detected Blank Grabber
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1832456 Sample: astralfreerelease0.36.1.exe Startdate: 14/12/2025 Architecture: WINDOWS Score: 100 71 api.telegram.org/bot8385038761 unknown unknown 2->71 73 ip-api.com 2->73 75 blank-r6yrk.in 2->75 87 Suricata IDS alerts for network traffic 2->87 89 Found malware configuration 2->89 91 Malicious sample detected (through community Yara rule) 2->91 93 18 other signatures 2->93 11 astralfreerelease0.36.1.exe 4 2->11         started        signatures3 process4 file5 57 C:\Users\...\astral free_release_0.36.1.exe, PE32 11->57 dropped 59 C:\Users\user\AppData\...lysiumFree.exe, PE32+ 11->59 dropped 61 C:\Users\...\astralfreerelease0.36.1.exe.log, CSV 11->61 dropped 113 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 11->113 115 Drops large PE files 11->115 15 ElysiumFree.exe 22 11->15         started        19 astral free_release_0.36.1.exe 14 2 11->19         started        signatures6 process7 dnsIp8 63 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 15->63 dropped 65 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+ 15->65 dropped 67 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 15->67 dropped 69 16 other malicious files 15->69 dropped 79 Multi AV Scanner detection for dropped file 15->79 81 Modifies Windows Defender protection settings 15->81 83 Adds a directory exclusion to Windows Defender 15->83 85 3 other signatures 15->85 22 ElysiumFree.exe 15->22         started        77 ip-api.com 208.95.112.1, 49718, 49741, 80 TUT-ASUS United States 19->77 25 WerFault.exe 19 16 19->25         started        file9 signatures10 process11 signatures12 97 Found many strings related to Crypto-Wallets (likely being stolen) 22->97 99 Modifies Windows Defender protection settings 22->99 101 Adds a directory exclusion to Windows Defender 22->101 103 2 other signatures 22->103 27 cmd.exe 1 22->27         started        30 cmd.exe 1 22->30         started        32 cmd.exe 22->32         started        34 cmd.exe 1 22->34         started        process13 signatures14 105 Modifies Windows Defender protection settings 27->105 107 Adds a directory exclusion to Windows Defender 27->107 109 Removes signatures from Windows Defender 27->109 36 powershell.exe 23 27->36         started        39 conhost.exe 27->39         started        41 powershell.exe 30->41         started        43 conhost.exe 30->43         started        45 MpCmdRun.exe 30->45         started        111 Uses WMIC command to query system information (often done to detect virtual machines) 32->111 47 conhost.exe 32->47         started        49 WMIC.exe 32->49         started        51 conhost.exe 34->51         started        53 tasklist.exe 34->53         started        process15 signatures16 95 Loading BitLocker PowerShell Module 36->95 55 WmiPrvSE.exe 36->55         started        process17
Verdict:
inconclusive
YARA:
10 match(es)
Tags:
.Net Executable Managed .NET PE (Portable Executable) PE File Layout SOS: 0.21 Win 32 Exe x86
Threat name:
ByteCode-MSIL.Trojan.XWormRAT
Status:
Malicious
First seen:
2025-12-11 00:54:12 UTC
File Type:
PE (.Net Exe)
Extracted files:
4
AV detection:
22 of 23 (95.65%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xworm defense_evasion discovery execution rat trojan upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Enumerates processes with tasklist
UPX packed file
Looks up external IP address via web service
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Command and Scripting Interpreter: PowerShell
Disables one or more Microsoft Defender components
Detect Xworm Payload
Xworm
Xworm family
Malware Config
C2 Extraction:
grenki2005-34712.portmap.host:34712
Verdict:
Malicious
Tags:
External_IP_Lookup
YARA:
n/a
Unpacked files
SH256 hash:
22340b89f926ff263bd94dbf8966b71afb1bb6c5618ecb593bc1e7b4566ece1a
MD5 hash:
a6c041503e8a1c81f85805f341e74a22
SHA1 hash:
935b13e683e9070305c9aa7f43bcbf348c6513c4
SH256 hash:
75d41aaa1c961aab18f19eadc5e176289b45aa455a44d2ef6eb7ed62c5e8d060
MD5 hash:
00f34f2a5a169223cace19e8c56fa8d0
SHA1 hash:
76f6e32b189126454cb7ed1d5ec81f1b8eae8fd5
SH256 hash:
a6fbd755f2c872bb1608afba2b8c81577316441145a10acce69b6ba260a3190d
MD5 hash:
7742daf23ded6894b0c1f9f261ab71c5
SHA1 hash:
6eeb3c4882bd6fc33efc4fffdf8aa2eab169eda1
Detections:
win_xworm_a0 win_xworm_w0 XWorm win_mal_XWorm INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA MALWARE_Win_AsyncRAT MALWARE_Win_XWorm
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__ConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:ldpreload
Author:xorseed
Reference:https://stuff.rop.io/
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:upxHook
Author:@r3dbU7z
Description:Detect artifacts from 'upxHook' - modification of UPX packer
Reference:https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/
Rule name:upx_largefile
Author:k3nr9
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:WHIRLPOOL_Constants
Author:phoul (@phoul)
Description:Look for WhirlPool constants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments