MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 44cbb9ba318ddc687dca3e0dfeba30db5469d50c9bbdbbfb5888efdd9889439e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 20


Intelligence 20 IOCs YARA 33 File information Comments

SHA256 hash: 44cbb9ba318ddc687dca3e0dfeba30db5469d50c9bbdbbfb5888efdd9889439e
SHA3-384 hash: 869a9a80dd6264cdd2d0c60f69a6d8b0d5ec9da251a3bce02d68fdd02bdb8aa811ca9b63b0555a875f44a33d12491e46
SHA1 hash: 4d7a81b0bc38cac442f80c81a3ff3de1beef3159
MD5 hash: 9edf2ea67490be79d8b2913d6e5887ac
humanhash: mars-comet-mango-cup
File name:Xworm V6.4.exe
Download: download sample
Signature AsyncRAT
File size:10'731'008 bytes
First seen:2025-10-16 09:05:10 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d59a4a699610169663a929d37c90be43 (75 x DCRat, 22 x njrat, 15 x SalatStealer)
ssdeep 196608:WmmunL7Y01Kwo2g9oiRzOtuRwZYrL1kehn4i7jy:WNunLk0Xo2g9oilOtutRka4i7jy
Threatray 1'114 similar samples on MalwareBazaar
TLSH T1CBB67B06B281C802CC7819B148164FE066B47E8D5F68D9A5B8C8777C6BFA1CDB1677F2
TrID 38.0% (.EXE) Win32 Executable Delphi generic (14182/79/4)
28.2% (.EXE) Win64 Executable (generic) (10522/11/4)
12.0% (.EXE) Win32 Executable (generic) (4504/4/1)
5.5% (.EXE) Win16/32 Executable Delphi generic (2072/23)
5.4% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
Reporter burger
Tags:AsyncRAT exe NjRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
219
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
Xworm V6.4.exe
Verdict:
Malicious activity
Analysis date:
2025-10-16 09:00:57 UTC
Tags:
rat njrat bladabindi

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
vmdetect asyncrat autorun
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a window
Searching for synchronization primitives
Using the Windows Management Instrumentation requests
Launching the default Windows debugger (dwwin.exe)
Сreating synchronization primitives
Sending a custom TCP request
Running batch commands
Creating a file
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Launching a process
DNS request
Connection attempt
Creating a file in the Windows directory
Enabling the libraries to load when starting the app (AppInit_DLLs)
Unauthorized injection to a recently created process
Enabling autorun
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm aspnet_compiler base64 cmd explorer fingerprint lolbin msbuild packed reconnaissance regasm regedit regsvcs runonce schtasks stealer telegram vbc xworm xworm
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-10-16T06:12:00Z UTC
Last seen:
2025-10-16T18:52:00Z UTC
Hits:
~10
Detections:
Trojan-Dropper.Win32.Delf.eimp Trojan.Win64.Agent.smdlnf Backdoor.MSIL.Mason.sb Trojan-Dropper.Win32.Delfea.sb Trojan-Dropper.Win32.Agent.gen Trojan.Win32.Agent.sb HEUR:Trojan.MSIL.Agent.gen Backdoor.MSIL.XWorm.b Trojan.MSIL.Agent.sba Trojan-Dropper.Win32.Agent.sb Trojan.Win32.Vimditator.sb HEUR:Trojan.Win64.Convagent.gen HEUR:Trojan.Win32.Generic HEUR:Trojan.MSIL.Xdwd.gen HEUR:Backdoor.MSIL.XWorm.gen HackTool.MSIL.Agent.sb
Result
Threat name:
SheetRat, XWorm
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allows loading of unsigned dll using appinit_dll
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Creates an undocumented autostart registry key
Drops large PE files
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected RUNPE
Yara detected SheetRat
Yara detected Telegram RAT
Yara detected Telegram Recon
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1796378 Sample: Xworm V6.4.exe Startdate: 16/10/2025 Architecture: WINDOWS Score: 100 70 logam-55945.portmap.host 2->70 82 Malicious sample detected (through community Yara rule) 2->82 84 Antivirus detection for dropped file 2->84 86 Antivirus / Scanner detection for submitted sample 2->86 88 12 other signatures 2->88 10 Xworm V6.4.exe 3 2->10         started        13 Atom.exe 2->13         started        signatures3 process4 file5 64 C:\Users\user\AppData\...\XWorm V6.4.exe, PE32 10->64 dropped 66 C:\Users\user\AppData\Local\...\Client1.exe, PE32 10->66 dropped 16 Client1.exe 3 5 10->16         started        21 XWorm V6.4.exe 2 10->21         started        92 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 13->92 23 TeamViewer.exe 13->23         started        25 cmd.exe 13->25         started        signatures6 process7 dnsIp8 68 logam-55945.portmap.host 193.161.193.99, 49693, 49695, 49699 BITREE-ASRU Russian Federation 16->68 62 C:\Users\user\Music\TeamViewer.exe, PE32 16->62 dropped 72 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 16->72 74 Creates an undocumented autostart registry key 16->74 76 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 16->76 80 3 other signatures 16->80 27 cmd.exe 1 16->27         started        30 cmd.exe 16->30         started        32 cmd.exe 1 16->32         started        40 27 other processes 16->40 34 WerFault.exe 19 16 21->34         started        78 Antivirus detection for dropped file 23->78 36 conhost.exe 25->36         started        38 schtasks.exe 25->38         started        file9 signatures10 process11 signatures12 90 Uses schtasks.exe or at.exe to add and modify task schedules 27->90 42 conhost.exe 27->42         started        44 schtasks.exe 1 27->44         started        46 conhost.exe 30->46         started        48 schtasks.exe 30->48         started        50 conhost.exe 32->50         started        52 schtasks.exe 32->52         started        54 conhost.exe 40->54         started        56 schtasks.exe 40->56         started        58 45 other processes 40->58 process13 process14 60 Conhost.exe 46->60         started       
Verdict:
XWorm
YARA:
16 match(es)
Tags:
.Net Executable Html Managed .NET PE (Portable Executable) PE File Layout RAT SFX 7z SOS: 0.42 SOS: 0.82 Win 32 Exe x86 XWorm
Threat name:
Win32.Trojan.XWStealer
Status:
Malicious
First seen:
2025-10-16 09:04:18 UTC
File Type:
PE (Exe)
Extracted files:
531
AV detection:
23 of 24 (95.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery execution persistence privilege_escalation
Behaviour
Modifies registry class
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Event Triggered Execution: AppInit DLLs
Modifies WinLogon for persistence
Unpacked files
SH256 hash:
44cbb9ba318ddc687dca3e0dfeba30db5469d50c9bbdbbfb5888efdd9889439e
MD5 hash:
9edf2ea67490be79d8b2913d6e5887ac
SHA1 hash:
4d7a81b0bc38cac442f80c81a3ff3de1beef3159
Detections:
win_xworm_a0 win_xworm_w0
SH256 hash:
35c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66
MD5 hash:
16e5a492c9c6ae34c59683be9c51fa31
SHA1 hash:
97031b41f5c56f371c28ae0d62a2df7d585adaba
SH256 hash:
61ca2366ff62d9234bf3843431f70d4d89394453d3309f4c95494c87af0e7eb8
MD5 hash:
5a3281b38a4b8070353a92dc221b98cf
SHA1 hash:
23bf69aa3895d22d3f71eb738a6e2943371cf768
Detections:
win_xworm_a0 win_xworm_w0 XWorm INDICATOR_SUSPICIOUS_EXE_RawPaste_URL INDICATOR_SUSPICIOUS_EXE_TelegramChatBot INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA MALWARE_Win_AsyncRAT MALWARE_Win_XWorm
SH256 hash:
64a0a588bfb057c877f42773976fd6952be90eafd373b3d0595fe20a8faccd74
MD5 hash:
1c3b5af02f308c2d61314fe6344a7434
SHA1 hash:
5a0278ad2d2cd2437044e4d8b5e998533982293b
SH256 hash:
b2e1d3b3012d7c3d9f372f5a4f092e68116949bd00ecf85d798fd21e95b46b25
MD5 hash:
9b10a5e0dd7710e4a266d8e3a2b4bf2d
SHA1 hash:
84283bb8349749e1c4f610282884b3dff8508019
SH256 hash:
aa3735e1fb48184d83f24bc5e3e02b97a7ba615e8166c308a3fec9127f1597d3
MD5 hash:
a27a24ac7819aafa1ca331d087e9b99d
SHA1 hash:
035cccf11854e41feec82f0491cbb459986f3626
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Base64_decoding
Author:iam-py-test
Description:Detect scripts which are decoding base64 encoded data (mainly Python, may apply to other languages)
Rule name:CHM_File_Executes_JS_Via_PowerShell
Author:daniyyell
Description:Detects a Microsoft Compiled HTML Help (CHM) file that executes embedded JavaScript to launch a messagebox via PowerShell
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:detect_tiny_vbs
Author:daniyyell
Description:Detects tiny VBS delivery technique
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:dsc
Author:Aaron DeVera
Description:Discord domains
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:grakate_stealer_nov_2021
Rule name:INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
Author:ditekSHen
Description:Detects Windows executables referencing non-Windows User-Agents
Rule name:INDICATOR_SUSPICIOUS_EXE_RawPaste_URL
Author:ditekSHen
Description:Detects executables (downlaoders) containing URLs to raw contents of a paste
Rule name:INDICATOR_SUSPICIOUS_EXE_TelegramChatBot
Author:ditekSHen
Description:Detects executables using Telegram Chat Bot
Rule name:Jupyter_infostealer
Author:CD_R0M_
Description:Rule for Jupyter Infostealer/Solarmarker malware from september 2021-December 2022
Rule name:MALWARE_Win_AsyncRAT
Author:ditekSHen
Description:Detects AsyncRAT
Rule name:MALWARE_Win_DLAgent10
Author:ditekSHen
Description:Detects known downloader agent
Rule name:MALWARE_Win_XWorm
Author:ditekSHen
Description:Detects XWorm
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:telegram_bot_api
Author:rectifyq
Description:Detects file containing Telegram Bot API
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:Windows_Trojan_XWorm_b7d6eaa8
Author:Elastic Security
Rule name:WIN_FileFix_Detection
Author:dogsafetyforeverone
Description:Detects FileFix social engineering technique that launches chained PowerShell and PHP commands from file explorer typed paths
Reference:FileFix social engineering with PowerShell and PHP commands
Rule name:win_xworm_w0
Author:jeFF0Falltrades
Description:Detects win.xworm.
Rule name:xworm
Author:jeFF0Falltrades
Rule name:XWorm
Author:ditekSHen
Description:Detects XWorm
Rule name:xworm_kingrat
Author:jeFF0Falltrades

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments