MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4edc085848c227c30b0022a28ef5054c19e60ef30ef5e7854ad2af29266d8bdd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
XWorm
Vendor detections: 13
| SHA256 hash: | 4edc085848c227c30b0022a28ef5054c19e60ef30ef5e7854ad2af29266d8bdd |
|---|---|
| SHA3-384 hash: | 17e5a26ade66f96538b902b654fae2d3d30883f94a9f54433f14a7a2e333d565367c91d419251701a840f68613e5ad42 |
| SHA1 hash: | 4e5757d543530d703c092c628b25ee6f9e71a32c |
| MD5 hash: | 8d6bd132b879cd1e447345e6675928b4 |
| humanhash: | paris-river-nine-alaska |
| File name: | SquadX_Loader.exe |
| Download: | download sample |
| Signature | XWorm |
| File size: | 8'552'448 bytes |
| First seen: | 2025-08-05 03:44:56 UTC |
| Last seen: | 2025-08-05 10:17:05 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 140094f13383e9ae168c4b35b6af3356 (32 x DCRat, 11 x CoinMiner, 10 x njrat) |
| ssdeep | 98304:uzlEk/4OElKMVWka8bYPX43pbuFvVKbBqvi4+wW7dE6RILH:iaSREoMVza8bYPXCbuFd8IpWq |
| Threatray | 8 similar samples on MalwareBazaar |
| TLSH | T1B0863318BEC82C07DC0696B060D94AAF384CEE5557042D60F67577E8DEB68E3E1F990E |
| TrID | 32.2% (.EXE) Win16 NE executable (generic) (5038/12/1) 28.8% (.EXE) Win32 Executable (generic) (4504/4/1) 13.0% (.EXE) OS/2 Executable (generic) (2029/13) 12.8% (.EXE) Generic Win/DOS Executable (2002/3) 12.8% (.EXE) DOS Executable Generic (2000/1) |
| Magika | pebin |
| dhash icon | 8696e0d4d4e89686 (1 x XWorm) |
| Reporter | |
| Tags: | exe xworm |
Intelligence
File Origin
# of uploads :
4
# of downloads :
50
Origin country :
UAVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SquadX_Loader.exe
Verdict:
Malicious activity
Analysis date:
2025-08-05 03:45:54 UTC
Tags:
github evasion stealer telegram exfiltration ims-api generic auto-reg auto-startup remote xworm
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Verdict:
Malicious
Score:
99.9%
Tags:
vmprotect asyncrat lien
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Сreating synchronization primitives
Creating a window
DNS request
Connection attempt
Sending a custom TCP request
Launching a process
Searching for synchronization primitives
Creating a file
Searching for the window
Creating a process with a hidden window
Changing a file
Launching the default Windows debugger (dwwin.exe)
Reading critical registry keys
Moving a recently created file
Replacing files
Unauthorized injection to a recently created process
Adding an exclusion to Microsoft Defender
Verdict:
Unknown
Threat level:
2.5/10
Confidence:
100%
Tags:
fasm
Verdict:
Malicious
Labled as:
ExNuma.Generic
Verdict:
Malicious
Score:
100%
Verdict:
Malware
File Type:
PE
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) Win 32 Exe x86
Verdict:
Malicious
Threat:
Family.XWORM
Threat name:
Win32.Trojan.ExNuma
Status:
Malicious
First seen:
2025-08-05 03:45:37 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
31 of 38 (81.58%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
xworm
pulsepack
phemedronestealer
Similar samples:
Result
Malware family:
xworm
Score:
10/10
Tags:
family:phemedrone family:xworm credential_access discovery execution persistence rat spyware stealer trojan
Behaviour
Modifies registry class
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Drops startup file
Executes dropped EXE
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Unsecured Credentials: Credentials In Files
Command and Scripting Interpreter: PowerShell
Downloads MZ/PE file
Detect Xworm Payload
Phemedrone
Phemedrone family
Xworm
Xworm family
Malware Config
C2 Extraction:
92.113.146.251:9944
https://api.telegram.org/bot8284420386:AAH2eqWIgZglNbjoPm1jseKZ-_RRn_-eWZA/sendMessage?chat_id=5695636067
https://api.telegram.org/bot8284420386:AAH2eqWIgZglNbjoPm1jseKZ-_RRn_-eWZA/sendMessage?chat_id=5695636067
Verdict:
Malicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
4edc085848c227c30b0022a28ef5054c19e60ef30ef5e7854ad2af29266d8bdd
MD5 hash:
8d6bd132b879cd1e447345e6675928b4
SHA1 hash:
4e5757d543530d703c092c628b25ee6f9e71a32c
SH256 hash:
9b1a888f21487044f4af4c555863def639ac8bb5bfbe22d36d0a7dbba8bc3dd9
MD5 hash:
b36d719b3ac8f10f64c9a4db0e216267
SHA1 hash:
6f2948d51be150b27a92e0fa32eb0a735103f3d4
SH256 hash:
493ae3d3a335763e7f11a545e2f355f2b6f8f2a720c6914cc4fa4f561ebfec9b
MD5 hash:
9bb9456b77cae2cbcd6594fbd3ce40ed
SHA1 hash:
1cfad0d4b97d7d3a0bdfa01016155ff1d3f69fcd
Malware family:
Phemedrone
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.16
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
| CHECK_TRUST_INFO | Requires Elevated Execution (level:requireAdministrator) | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| WIN32_PROCESS_API | Can Create Process and Threads | kernel32.dll::VirtualAllocExNuma kernel32.dll::CreateThread |
| WIN_BASE_USER_API | Retrieves Account Information | kernel32.dll::GetComputerNameA |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.