Threat name:
SheetRat, TORNADO Stealer, Xmrig
Alert
Classification:
troj.spyw.evad.mine
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Contains functionality to capture screen (.Net source)
Creates an undocumented autostart registry key
Drops PE files to the user root directory
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found strings related to Crypto-Mining
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sample uses string decryption to hide its real strings
Sigma detected: Capture Wi-Fi password
Sigma detected: Disable power options
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Stop EventLog
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal Mail credentials (via file / registry access)
Unusual module load detection (module proxying)
Uses netsh to modify the Windows network and firewall settings
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected TORNADO Stealer
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1832910
Sample:
rate.exe
Startdate:
15/12/2025
Architecture:
WINDOWS
Score:
100
149
pool.hashvault.pro
2->149
151
ipapi.co
2->151
153
2 other IPs or domains
2->153
169
Suricata IDS alerts
for network traffic
2->169
171
Found malware configuration
2->171
173
Malicious sample detected
(through community Yara
rule)
2->173
175
19 other signatures
2->175
13
rate.exe
4
2->13
started
17
chrome_updater.exe
2->17
started
19
svinopaz.exe
1
2->19
started
21
2 other processes
2->21
signatures3
process4
file5
137
C:\Users\user\svinopaz.exe, PE32
13->137
dropped
139
C:\Users\user\svinopas.exe, PE32
13->139
dropped
141
C:\Users\user\AppData\Local\...\rate.exe.log, CSV
13->141
dropped
211
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
13->211
213
Obfuscated command line
found
13->213
215
Creates an undocumented
autostart registry key
13->215
229
3 other signatures
13->229
23
svinopas.exe
3
33
13->23
started
28
cmd.exe
1
13->28
started
30
cmd.exe
1
13->30
started
32
cmd.exe
1
13->32
started
143
C:\Windows\Temp\frbwvxmpxapp.sys, PE32+
17->143
dropped
217
Multi AV Scanner detection
for dropped file
17->217
219
Modifies the context
of a thread in another
process (thread injection)
17->219
221
Adds a directory exclusion
to Windows Defender
17->221
231
2 other signatures
17->231
34
powershell.exe
17->34
started
36
cmd.exe
17->36
started
38
cmd.exe
17->38
started
40
10 other processes
17->40
223
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
19->223
225
Queries sensitive Plug
and Play Device Information
(via WMI, Win32_PnPEntity,
often done to detect
virtual machines)
19->225
227
Queries memory information
(via WMI often done
to detect virtual machines)
19->227
signatures6
process7
dnsIp8
155
193.233.175.123, 1566
REDCOM-ASRedcomKhabarovskRussiaRU
Russian Federation
23->155
157
95.181.212.171, 1566, 49713, 49715
OTKRU
Russian Federation
23->157
159
94.156.102.130, 1566, 49716, 49717
NETERRA-ASBG
Bulgaria
23->159
129
C:\Users\user\AppData\...\tmpDE04.tmp.exe, PE32
23->129
dropped
131
C:\Users\user\AppData\...\tmpDA98.tmp.exe, PE32+
23->131
dropped
133
C:\Users\user\AppData\...\tmpC232.tmp.exe, PE32
23->133
dropped
135
12 other malicious files
23->135
dropped
177
Multi AV Scanner detection
for dropped file
23->177
179
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
23->179
181
Found many strings related
to Crypto-Wallets (likely
being stolen)
23->181
193
4 other signatures
23->193
42
cmd.exe
23->42
started
45
cmd.exe
23->45
started
51
2 other processes
23->51
183
Queries sensitive physical
memory information (via
WMI, Win32_PhysicalMemory,
often done to detect
virtual machines)
28->183
185
Queries sensitive network
adapter information
(via WMI, Win32_NetworkAdapter,
often done to detect
virtual machines)
28->185
187
Suspicious powershell
command line found
28->187
195
6 other signatures
28->195
47
conhost.exe
28->47
started
53
2 other processes
30->53
55
2 other processes
32->55
189
Loading BitLocker PowerShell
Module
34->189
49
conhost.exe
34->49
started
161
pool.hashvault.pro
216.219.85.122
IS-AS-1US
United States
36->161
191
Query firmware table
information (likely
to detect VMs)
36->191
57
2 other processes
38->57
59
9 other processes
40->59
file9
signatures10
process11
signatures12
197
Suspicious powershell
command line found
42->197
61
powershell.exe
42->61
started
63
conhost.exe
42->63
started
65
powershell.exe
45->65
started
67
conhost.exe
45->67
started
199
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
47->199
201
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
47->201
203
Queries sensitive Plug
and Play Device Information
(via WMI, Win32_PnPEntity,
often done to detect
virtual machines)
47->203
205
Queries memory information
(via WMI often done
to detect virtual machines)
47->205
69
powershell.exe
51->69
started
71
powershell.exe
51->71
started
73
conhost.exe
51->73
started
75
conhost.exe
51->75
started
process13
process14
77
tmpB022.tmp.exe
61->77
started
82
Conhost.exe
61->82
started
84
tmpB246.tmp.exe
65->84
started
86
tmp8E7F.tmp.exe
69->86
started
88
tmp90C2.tmp.exe
71->88
started
dnsIp15
163
193.233.85.21
FREE-MPEIRU
Russian Federation
77->163
165
icanhazip.com
104.16.184.241
CLOUDFLARENETUS
United States
77->165
167
2 other IPs or domains
77->167
145
C:\Program Filesbehaviorgraphoogle\Chrome\...\xaitx.exe, PE32+
77->145
dropped
233
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
77->233
235
Queries sensitive physical
memory information (via
WMI, Win32_PhysicalMemory,
often done to detect
virtual machines)
77->235
237
Queries sensitive network
adapter information
(via WMI, Win32_NetworkAdapter,
often done to detect
virtual machines)
77->237
253
4 other signatures
77->253
90
cmd.exe
77->90
started
93
cmd.exe
77->93
started
95
Conhost.exe
77->95
started
239
Tries to steal Mail
credentials (via file
/ registry access)
84->239
241
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
84->241
243
Tries to harvest and
steal browser information
(history, passwords,
etc)
84->243
97
Conhost.exe
84->97
started
147
C:\ProgramData\Chrome\chrome_updater.exe, PE32+
86->147
dropped
245
Multi AV Scanner detection
for dropped file
86->245
247
Uses powercfg.exe to
modify the power settings
86->247
249
Adds a directory exclusion
to Windows Defender
86->249
251
Modifies power options
to not sleep / hibernate
86->251
99
powershell.exe
86->99
started
101
cmd.exe
86->101
started
103
cmd.exe
86->103
started
105
13 other processes
86->105
file16
signatures17
process18
signatures19
207
Tries to harvest and
steal WLAN passwords
90->207
107
chcp.com
90->107
started
115
3 other processes
90->115
117
2 other processes
93->117
209
Loading BitLocker PowerShell
Module
99->209
109
conhost.exe
99->109
started
111
Conhost.exe
99->111
started
119
3 other processes
101->119
121
2 other processes
103->121
113
conhost.exe
105->113
started
123
13 other processes
105->123
process20
process21
125
Conhost.exe
107->125
started
127
Conhost.exe
113->127
started
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.