MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b683ba948e1d61180ff6a08d72f354e3280c260e7f8ff2cf3c9ca40bc9c76c4b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XWorm


Vendor detections: 17


Intelligence 17 IOCs 1 YARA 3 File information Comments

SHA256 hash: b683ba948e1d61180ff6a08d72f354e3280c260e7f8ff2cf3c9ca40bc9c76c4b
SHA3-384 hash: 931dba69f85f31727b8a63cab22950dd9a8b1c49f2a796e3180fdfa5b875a486e6e6d4c875da08648b04fcd264f0455a
SHA1 hash: 688acad1c8744914ea6da018f8a19ad3e35d39b0
MD5 hash: fb2aaf4f621e9f67cf438a697c454a36
humanhash: washington-twelve-september-chicken
File name:FB2AAF4F621E9F67CF438A697C454A36.exe
Download: download sample
Signature XWorm
File size:16'379'392 bytes
First seen:2025-10-11 00:05:44 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'653 x AgentTesla, 19'464 x Formbook, 12'205 x SnakeKeylogger)
ssdeep 393216:LpUGIM90pfUcGo93qmo2N1N8orw98xki:CLyOfUx622XhR
Threatray 101 similar samples on MalwareBazaar
TLSH T16EF6CCFA291B1377A73D9BB71E17795AE05671BF014826CC4E93200F5952E782EB02CB
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter abuse_ch
Tags:exe xworm


Avatar
abuse_ch
XWorm C2:
172.111.139.198:6677

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
172.111.139.198:6677 https://threatfox.abuse.ch/ioc/1611644/

Intelligence


File Origin
# of uploads :
1
# of downloads :
174
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
XWormV6.6CRACKEAD.exe
Verdict:
Malicious activity
Analysis date:
2025-10-11 00:06:14 UTC
Tags:
xworm

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file in the %AppData% directory
Creating a process from a recently created file
Creating a file
Creating a file in the %temp% directory
Loading a suspicious library
Using the Windows Management Instrumentation requests
Creating a window
Searching for synchronization primitives
Creating a process with a hidden window
Launching the default Windows debugger (dwwin.exe)
Enabling the 'hidden' option for recently created files
Running batch commands
Launching a process
Searching for the window
Adding an access-denied ACE
Unauthorized injection to a recently created process
Setting a global event handler for the keyboard
Creating a file in the mass storage device
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Enabling threat expansion on mass storage devices
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
asyncrat packed unsafe vbnet xworm
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-10-07T19:18:00Z UTC
Last seen:
2025-10-12T15:44:00Z UTC
Hits:
~10
Detections:
Backdoor.MSIL.XWorm.c PDM:Worm.Win32.Generic HEUR:Trojan.Win32.Generic HEUR:Trojan.MSIL.APosT.gen Backdoor.MSIL.Agent.sb Trojan-PSW.Win32.Stealer.sb Trojan.MSIL.Agent.sb PDM:Trojan.Win32.Generic Backdoor.Agent.TCP.C&C Trojan.Win32.Agent.sb Trojan.MSIL.Crypt.sb HEUR:Backdoor.MSIL.XWorm.gen HEUR:Backdoor.MSIL.XClient.b Trojan-Downloader.Win32.Bitser.sb HEUR:Trojan-Spy.WinLNK.Xegumumune.gen HEUR:Exploit.MSIL.BypassUAC.gen Backdoor.MSIL.XWorm.b Backdoor.MSIL.XWorm.a Trojan.WinLNK.Agent.fb Trojan.MSIL.Agent.sba HEUR:Trojan-Dropper.MSIL.Agent.gen HackTool.MSIL.Agent.sb
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
AI detected malicious Powershell script
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Found malware configuration
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Yara detected RUNPE
Yara detected Telegram RAT
Yara detected Telegram Recon
Yara detected UAC Bypass using CMSTP
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1793228 Sample: rlgL5hqdi6.exe Startdate: 11/10/2025 Architecture: WINDOWS Score: 100 82 network112.duckdns.org 2->82 84 keyauth.win 2->84 88 Suricata IDS alerts for network traffic 2->88 90 Found malware configuration 2->90 92 Malicious sample detected (through community Yara rule) 2->92 96 18 other signatures 2->96 10 rlgL5hqdi6.exe 4 2->10         started        13 svchst.exe 2->13         started        17 svchst.exe 2->17         started        signatures3 94 Uses dynamic DNS services 82->94 process4 dnsIp5 74 C:\Users\user\AppData\Roaming\svchst.exe, PE32 10->74 dropped 76 C:\Users\user\AppData\...\XWorm V6.5.exe, PE32 10->76 dropped 78 C:\Users\user\AppData\...\rlgL5hqdi6.exe.log, CSV 10->78 dropped 19 svchst.exe 4 10->19         started        23 XWorm V6.5.exe 3 10->23         started        86 network112.duckdns.org 172.111.139.198, 49731, 6677 VOXILITYGB United States 13->86 80 C:\Users\user\AppData\...\s5jroxojizl.ps1, ASCII 13->80 dropped 110 Protects its processes via BreakOnTermination flag 13->110 25 cmd.exe 13->25         started        27 csc.exe 13->27         started        29 svchst.exe 13->29         started        112 Antivirus detection for dropped file 17->112 114 Multi AV Scanner detection for dropped file 17->114 116 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 17->116 118 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 17->118 file6 signatures7 process8 file9 64 C:\Users\user\AppData\Local\svchst.exe, PE32 19->64 dropped 98 Antivirus detection for dropped file 19->98 100 Multi AV Scanner detection for dropped file 19->100 102 Bypasses PowerShell execution policy 19->102 104 Adds a directory exclusion to Windows Defender 19->104 31 cmd.exe 19->31         started        34 powershell.exe 23 19->34         started        36 powershell.exe 23 19->36         started        66 C:\Users\user\AppData\...\Protect2a3d628b.dll, PE32+ 23->66 dropped 106 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 23->106 38 WerFault.exe 19 16 23->38         started        108 Suspicious powershell command line found 25->108 40 powershell.exe 25->40         started        43 conhost.exe 25->43         started        68 C:\Users\user\AppData\Local\Temp\svchst.exe, PE32 27->68 dropped 45 conhost.exe 27->45         started        47 cvtres.exe 27->47         started        signatures10 process11 file12 120 Suspicious powershell command line found 31->120 49 conhost.exe 31->49         started        51 timeout.exe 31->51         started        122 Loading BitLocker PowerShell Module 34->122 53 conhost.exe 34->53         started        55 conhost.exe 36->55         started        70 C:\Users\user\AppData\...\0ozrhoid.cmdline, Unicode 40->70 dropped 57 csc.exe 40->57         started        60 conhost.exe 40->60         started        signatures13 process14 file15 72 C:\Users\user\AppData\Local\...\0ozrhoid.dll, PE32 57->72 dropped 62 cvtres.exe 57->62         started        process16
Verdict:
inconclusive
YARA:
11 match(es)
Tags:
.Net Executable Managed .NET PE (Portable Executable) PE File Layout SOS: 0.18 Win 32 Exe x86
Threat name:
Win32.Spyware.AsyncRAT
Status:
Malicious
First seen:
2025-10-08 00:54:22 UTC
File Type:
PE (.Net Exe)
Extracted files:
11
AV detection:
31 of 36 (86.11%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:xworm defense_evasion execution persistence ransomware rat trojan
Behaviour
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Uses Volume Shadow Copy service COM API
Enumerates physical storage devices
Hide Artifacts: Hidden Window
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Command and Scripting Interpreter: PowerShell
Detect Xworm Payload
Xworm
Xworm family
Unpacked files
SH256 hash:
b683ba948e1d61180ff6a08d72f354e3280c260e7f8ff2cf3c9ca40bc9c76c4b
MD5 hash:
fb2aaf4f621e9f67cf438a697c454a36
SHA1 hash:
688acad1c8744914ea6da018f8a19ad3e35d39b0
SH256 hash:
dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd
MD5 hash:
544cd51a596619b78e9b54b70088307d
SHA1 hash:
4769ddd2dbc1dc44b758964ed0bd231b85880b65
SH256 hash:
6a26df7ee49de6fec6c5de1f3f7a94075d2dfbc50922e3b30fd8111f2e734f33
MD5 hash:
f45c1512d5a47375e6e396b4d1111e58
SHA1 hash:
8af036b8c60d10e85cf82212930bb04bc0553f36
SH256 hash:
ccc36b37b4d2646084e05f449600cb4e5a2954e7513f886fde374cfb1d4602d1
MD5 hash:
4842280e6ccb07072a2c3df41efb5f94
SHA1 hash:
665d927913b6a7a2b419075dca8eec7bc76bb77a
Detections:
SUSP_NET_Large_Static_Array_In_Small_File_Jan24 INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments