MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 899f59db7e0fb9731002fb1922785bc217ebb1f8183f30e3a2d2945620e99902. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XWorm


Vendor detections: 17


Intelligence 17 IOCs 1 YARA 3 File information Comments

SHA256 hash: 899f59db7e0fb9731002fb1922785bc217ebb1f8183f30e3a2d2945620e99902
SHA3-384 hash: 2480f836fd429918d05832e0237f362c26498909186b8805583c49a51a316589276c4ccff69aadf929925a304b558e1e
SHA1 hash: 039a79b30c351abef78c0e8e0d9a18d579870acb
MD5 hash: c0b40e2ce8caa4abcf8bb894c51426c1
humanhash: dakota-diet-failed-timing
File name:C0B40E2CE8CAA4ABCF8BB894C51426C1.exe
Download: download sample
Signature XWorm
File size:821'760 bytes
First seen:2025-09-09 06:15:18 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a9c887a4f18a3fede2cc29ceea138ed3 (33 x CoinMiner, 17 x AsyncRAT, 15 x BlankGrabber)
ssdeep 12288:HxqsKCrpNaLOkg1vFYW/3P4ju3xNHcgbHSbjxxAifP+zWHC72:HEsprRFYW/36u3THci4j5PIWHC7
Threatray 3'035 similar samples on MalwareBazaar
TLSH T142057E33BA33A61BC51929BBFC833B748F5586E4141A9BDF1A7618277454E8CBB03631
TrID 38.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
15.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
11.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.5% (.EXE) Win32 Executable (generic) (4504/4/1)
4.8% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Magika pebin
Reporter abuse_ch
Tags:exe xworm


Avatar
abuse_ch
XWorm C2:
147.185.221.31:29537

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
147.185.221.31:29537 https://threatfox.abuse.ch/ioc/1585491/

Intelligence


File Origin
# of uploads :
1
# of downloads :
113
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
C0B40E2CE8CAA4ABCF8BB894C51426C1.exe
Verdict:
Malicious activity
Analysis date:
2025-09-09 06:25:15 UTC
Tags:
auto-reg remote xworm

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.9%
Tags:
obfuscate xtreme shell
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated packed packed packer_detected
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-09-05T13:46:00Z UTC
Last seen:
2025-09-05T13:46:00Z UTC
Hits:
~10
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Babadeda, XWorm
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Drops executables to the windows directory (C:\Windows) and starts them
Encrypted powershell cmdline option found
Found malware configuration
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Protects its processes via BreakOnTermination flag
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Babadeda
Yara detected UAC Bypass using CMSTP
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1773730 Sample: b1zlLt2FKG.exe Startdate: 09/09/2025 Architecture: WINDOWS Score: 100 69 enter-dayton.gl.at.ply.gg 2->69 75 Found malware configuration 2->75 77 Malicious sample detected (through community Yara rule) 2->77 79 Antivirus / Scanner detection for submitted sample 2->79 81 11 other signatures 2->81 9 b1zlLt2FKG.exe 3 2->9         started        13 System33.exe 2->13         started        16 System33.exe 2->16         started        18 3 other processes 2->18 signatures3 process4 dnsIp5 63 C:\Windows\System33.exe, PE32 9->63 dropped 65 C:\Windows\CrypterX.exe, PE32 9->65 dropped 93 Encrypted powershell cmdline option found 9->93 95 Drops executables to the windows directory (C:\Windows) and starts them 9->95 20 System33.exe 2 9->20         started        24 powershell.exe 23 9->24         started        26 CrypterX.exe 8 9->26         started        71 enter-dayton.gl.at.ply.gg 147.185.221.31, 29537, 49720, 49722 SALSGIVERUS United States 13->71 67 C:\ProgramData\System33.exe, PE32 13->67 dropped 97 Protects its processes via BreakOnTermination flag 13->97 99 Adds a directory exclusion to Windows Defender 13->99 28 powershell.exe 13->28         started        30 powershell.exe 13->30         started        32 powershell.exe 13->32         started        34 schtasks.exe 13->34         started        101 Antivirus detection for dropped file 16->101 103 Uses schtasks.exe or at.exe to add and modify task schedules 16->103 73 127.0.0.1 unknown unknown 18->73 file6 signatures7 process8 file9 61 C:\Windows\System32\System33.exe, PE32 20->61 dropped 85 Antivirus detection for dropped file 20->85 87 Bypasses PowerShell execution policy 20->87 89 Adds a directory exclusion to Windows Defender 20->89 36 powershell.exe 22 20->36         started        39 powershell.exe 23 20->39         started        41 conhost.exe 24->41         started        43 cmd.exe 1 26->43         started        45 conhost.exe 26->45         started        91 Loading BitLocker PowerShell Module 28->91 47 conhost.exe 28->47         started        49 conhost.exe 30->49         started        51 conhost.exe 32->51         started        53 conhost.exe 34->53         started        signatures10 process11 signatures12 83 Loading BitLocker PowerShell Module 36->83 55 conhost.exe 36->55         started        57 conhost.exe 39->57         started        59 conhost.exe 47->59         started        process13
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Dropper.Dapato
Status:
Malicious
First seen:
2025-09-06 23:33:00 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
23 of 24 (95.83%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:xworm defense_evasion discovery execution persistence rat trojan
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Enumerates system info in registry
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
Drops file in System32 directory
Adds Run key to start application
Obfuscated Files or Information: Command Obfuscation
Checks computer location settings
Executes dropped EXE
Command and Scripting Interpreter: PowerShell
Detect Xworm Payload
Xworm
Xworm family
Malware Config
C2 Extraction:
enter-dayton.gl.at.ply.gg:29537
Unpacked files
SH256 hash:
899f59db7e0fb9731002fb1922785bc217ebb1f8183f30e3a2d2945620e99902
MD5 hash:
c0b40e2ce8caa4abcf8bb894c51426c1
SHA1 hash:
039a79b30c351abef78c0e8e0d9a18d579870acb
SH256 hash:
a04205db4c57aa48d0a27cf2cabe77c68c540517133e5ed7a051887415f1a29b
MD5 hash:
3b9dcd25dc70d0192e3a325881ca739b
SHA1 hash:
72f31a40ee25e0d8d91e4d7b55ff27bb425e0ce1
SH256 hash:
27a684aaa5d7d832faf78ad05db1bf564e37b966b7a4cdd50a6dc5c482458576
MD5 hash:
df87d31263cc41ea1368edf36c3e8e5f
SHA1 hash:
8f16383974a1fefd6e014d31dea81e7c567e357e
Detections:
SUSP_Imphash_Mar23_3
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments