MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f3dcd3b6d452657247936a87c06e2bef42261a46035453d58ff0c7d1106e8393. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XWorm


Vendor detections: 19


Intelligence 19 IOCs 1 YARA 17 File information Comments

SHA256 hash: f3dcd3b6d452657247936a87c06e2bef42261a46035453d58ff0c7d1106e8393
SHA3-384 hash: 417f8c03a328e1a9d4fe52f1c2e70093863166bad87b4a35e43459f50e508cefee1f6441c97a0bae01d5e3164c1cfdd4
SHA1 hash: f5763e0a2e3244b4414129b0147fdff8218afc51
MD5 hash: b2abaf2ea97ae5bebc2e4e37069b7d8c
humanhash: tennessee-georgia-utah-april
File name:XD.exe
Download: download sample
Signature XWorm
File size:15'030'272 bytes
First seen:2025-08-08 09:15:24 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a9c887a4f18a3fede2cc29ceea138ed3 (33 x CoinMiner, 17 x AsyncRAT, 15 x BlankGrabber)
ssdeep 393216:XhUWA6P1N2VZ2treBHhObtMmPMtFltxlDI0QUdXvKtXr9iwE:XhUWZtNy2treBH6tMmWltbD10ZQ
TLSH T167E633CD8FE2EFCCDE745866BB55672E9B6B6F321555930C803470A1F1A0E870D806EA
TrID 38.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
15.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
11.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.5% (.EXE) Win32 Executable (generic) (4504/4/1)
4.8% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Magika pebin
Reporter abuse_ch
Tags:exe xworm


Avatar
abuse_ch
XWorm C2:
147.185.221.30:56685

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
147.185.221.30:56685 https://threatfox.abuse.ch/ioc/1565838/

Intelligence


File Origin
# of uploads :
1
# of downloads :
71
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
XD.exe
Verdict:
Malicious activity
Analysis date:
2025-08-08 08:57:04 UTC
Tags:
evasion auto-startup netreactor

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.9%
Tags:
autorun shell virus sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a process with a hidden window
Creating a window
Creating a file in the %AppData% subdirectories
Launching a process
Creating a file
Сreating synchronization primitives
DNS request
Connection attempt
Sending a custom TCP request
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Unauthorized injection to a recently created process
Forced shutdown of a system process
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Malware family:
Sharp Stealer
Verdict:
Malicious
Result
Threat name:
Blank Grabber, PureLog Stealer, Umbral S
Detection:
malicious
Classification:
troj.adwa.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Creates multiple autostart registry keys
Drops PE files to the startup folder
Drops PE files with a suspicious file extension
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Modifies the hosts file
Modifies Windows Defender protection settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file has nameless sections
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Set autostart key via New-ItemProperty Cmdlet
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Suspicious Startup Folder Persistence
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect debuggers (CloseHandle check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to evade analysis by execution special instruction (VM detection)
Tries to harvest and steal browser information (history, passwords, etc)
Uses attrib.exe to hide files
Uses ping.exe to check the status of other devices and networks
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Blank Grabber
Yara detected PureLog Stealer
Yara detected Umbral Stealer
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1752883 Sample: XD.exe Startdate: 08/08/2025 Architecture: WINDOWS Score: 100 124 open-tyler.gl.at.ply.gg 2->124 126 ip-api.com 2->126 128 discord.com 2->128 148 Suricata IDS alerts for network traffic 2->148 150 Found malware configuration 2->150 152 Malicious sample detected (through community Yara rule) 2->152 154 23 other signatures 2->154 11 XD.exe 4 2->11         started        14 HWMonitor.exe 2->14         started        17 HWMonitor.exe 2->17         started        19 2 other processes 2->19 signatures3 process4 file5 116 C:\Users\user\AppData\Local\Temp\temp.exe, PE32 11->116 dropped 118 C:\Users\user\AppData\Local\Temp\hwid.exe, PE32 11->118 dropped 120 C:\Users\user\AppData\Local\Temp\XD.exe, PE32+ 11->120 dropped 21 temp.exe 5 11->21         started        25 hwid.exe 5 11->25         started        27 XD.exe 1 11->27         started        196 Antivirus detection for dropped file 14->196 198 Multi AV Scanner detection for dropped file 14->198 29 RegAsm.exe 14->29         started        31 RegAsm.exe 17->31         started        33 RegAsm.exe 17->33         started        35 RegAsm.exe 17->35         started        37 RegAsm.exe 19->37         started        39 2 other processes 19->39 signatures6 process7 file8 106 C:\Users\user\AppData\...\HWMonitor.exe, PE32 21->106 dropped 156 Antivirus detection for dropped file 21->156 158 Multi AV Scanner detection for dropped file 21->158 160 Suspicious powershell command line found 21->160 41 RegAsm.exe 2 21->41         started        45 powershell.exe 1 11 21->45         started        108 C:\Users\user\AppData\...\HWMonitor.exe, PE32 25->108 dropped 162 Found many strings related to Crypto-Wallets (likely being stolen) 25->162 164 Writes to foreign memory regions 25->164 166 Allocates memory in foreign processes 25->166 168 Injects a PE file into a foreign processes 25->168 47 RegAsm.exe 16 11 25->47         started        50 powershell.exe 1 11 25->50         started        52 conhost.exe 25->52         started        54 conhost.exe 25->54         started        170 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 27->170 172 Query firmware table information (likely to detect VMs) 27->172 174 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 27->174 176 4 other signatures 27->176 56 conhost.exe 27->56         started        58 ds.exe 31->58         started        60 ds.exe 37->60         started        signatures9 process10 dnsIp11 110 C:\Users\user\AppData\Local\Temp\ds.exe, PE32 41->110 dropped 178 Suspicious powershell command line found 41->178 180 Drops PE files with a suspicious file extension 41->180 182 Drops PE files to the startup folder 41->182 194 2 other signatures 41->194 62 ds.exe 41->62         started        184 Creates multiple autostart registry keys 45->184 67 conhost.exe 45->67         started        132 ip-api.com 208.95.112.1, 49691, 49692, 80 TUT-ASUS United States 47->132 134 discord.com 162.159.135.232, 443, 49693 CLOUDFLARENETUS United States 47->134 112 C:\ProgramData\Microsoft\...\FHJbd.scr, PE32 47->112 dropped 114 C:\Windows\System32\drivers\etc\hosts, ASCII 47->114 dropped 186 Found many strings related to Crypto-Wallets (likely being stolen) 47->186 188 Tries to harvest and steal browser information (history, passwords, etc) 47->188 190 Modifies Windows Defender protection settings 47->190 192 Modifies the hosts file 47->192 69 cmd.exe 47->69         started        71 powershell.exe 47->71         started        73 WMIC.exe 47->73         started        77 9 other processes 47->77 75 conhost.exe 50->75         started        file12 signatures13 process14 dnsIp15 130 open-tyler.gl.at.ply.gg 147.185.221.30, 49694, 49696, 49697 SALSGIVERUS United States 62->130 122 C:\Users\user\AppData\...\RuntimeBroker.exe, PE32 62->122 dropped 136 Antivirus detection for dropped file 62->136 138 Multi AV Scanner detection for dropped file 62->138 140 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 62->140 146 3 other signatures 62->146 79 powershell.exe 62->79         started        82 powershell.exe 62->82         started        84 powershell.exe 62->84         started        92 2 other processes 62->92 142 Uses ping.exe to check the status of other devices and networks 69->142 94 2 other processes 69->94 144 Loading BitLocker PowerShell Module 71->144 86 conhost.exe 71->86         started        88 conhost.exe 73->88         started        90 conhost.exe 77->90         started        96 6 other processes 77->96 file16 signatures17 process18 signatures19 200 Loading BitLocker PowerShell Module 79->200 98 conhost.exe 79->98         started        100 conhost.exe 82->100         started        102 conhost.exe 84->102         started        104 conhost.exe 92->104         started        process20
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) Win 32 Exe x86
Threat name:
Win32.Dropper.Dapato
Status:
Malicious
First seen:
2025-08-08 08:57:05 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
22 of 24 (91.67%)
Threat level:
  3/5
Verdict:
malicious
Label(s):
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:umbral discovery execution stealer upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
UPX packed file
Looks up external IP address via web service
.NET Reactor proctector
Checks computer location settings
Executes dropped EXE
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
Detects Umbral payload
Umbral
Umbral family
Malware Config
C2 Extraction:
https://discord.com/api/webhooks/1403042121883320484/9WbAs0bPHb6YfQsmm1AF5G860_fm8uLpAp2y6aBwycxzEAp7GtFrd9gOAN-XnF3qVxqK
Unpacked files
SH256 hash:
3713a38831c7925a4e91a0a39afcfc8d6b79c8ebabd7e633ccdc9fa4f42076b8
MD5 hash:
b05b94fe21ea1111804f0382df2214c6
SHA1 hash:
ad2e9fc9768a8468c4acac072bddf8b266e39093
SH256 hash:
a4073c9cae0eea6e68a8fefeefbe7d5960c3fa2dd851e8b2fc35475904a6b365
MD5 hash:
4f1863fdccc951127e4dbcc3119a0f9a
SHA1 hash:
10e0143b516864307ba3076911cbc8e840448c18
Detections:
INDICATOR_EXE_Packed_NyanXCat_CSharpLoader
SH256 hash:
8af4e4737033f104b98567fb8baae242046b8596910d14f579eefd55c48f3428
MD5 hash:
8764215d99bc1be5b5899ed9b5508b67
SHA1 hash:
396ae38664c618583148b594422af6a3629115e5
Detections:
INDICATOR_EXE_Packed_NyanXCat_CSharpLoader
SH256 hash:
cf30eab684ffbd2b953edd9076792f3ac2dde8b26360e4c80460c275cac681a4
MD5 hash:
e32b756d88e24a0bd809c3f128b40733
SHA1 hash:
49fa28dcc284d1c1ad8a1e8b2c9abdf3c2c726a5
Detections:
MAL_NET_LimeCrypter_RunPE_Jan24
SH256 hash:
1807535005a0c98a9123e003da145afbb832b6a86602e39cfde46be11aa69635
MD5 hash:
7aa29d32aae9c75430fabbff4b98bfbf
SHA1 hash:
d6802cabd93a63c2cc5dbccb8bac3d06e3ce46f7
Detections:
UmbralStealer INDICATOR_SUSPICIOUS_EXE_SandboxUserNames INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice INDICATOR_SUSPICIOUS_EXE_SandboxComputerNames INDICATOR_SUSPICIOUS_EXE_SandboxSystemUUIDs MALWARE_Win_UmbralStealer
SH256 hash:
b533f6c0dfbde43d9f5a08979b89c2e86502a04fb1b16ece8da726ab0b835600
MD5 hash:
405f1e7c7277798520f98b916075232c
SHA1 hash:
1d1b7b8bbe780261161002ad7966f1dde8bf439f
SH256 hash:
d9875019f9d3c9f5af4e9ff647e666687b752a048c6bc2fbff9bea5257df2de7
MD5 hash:
3b765a5c853fecde1776a46647b8374b
SHA1 hash:
68eeed07b27d8adb8e60eea3d897cfa3f04c7d44
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24 INDICATOR_EXE_Packed_DotNetReactor
SH256 hash:
f3dcd3b6d452657247936a87c06e2bef42261a46035453d58ff0c7d1106e8393
MD5 hash:
b2abaf2ea97ae5bebc2e4e37069b7d8c
SHA1 hash:
f5763e0a2e3244b4414129b0147fdff8218afc51
Malware family:
UmbralStealer
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:botnet_plaintext_c2
Author:cip
Description:Attempts to match at least some of the strings used in some botnet variants which use plaintext communication protocols.
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:INDICATOR_SUSPICIOUS_EXE_SandboxComputerNames
Author:ditekSHen
Description:Detects executables containing possible sandbox analysis VM names
Rule name:INDICATOR_SUSPICIOUS_EXE_SandboxSystemUUIDs
Author:ditekSHen
Description:Detects executables containing possible sandbox system UUIDs
Rule name:INDICATOR_SUSPICIOUS_EXE_SandboxUserNames
Author:ditekSHen
Description:Detects executables containing possible sandbox analysis VM usernames
Rule name:INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice
Author:ditekSHen
Description:Detects executables attemping to enumerate video devices using WMI
Rule name:MALWARE_Win_UmbralStealer
Author:ditekShen
Description:Detects Umbral infostealer
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:UmbrealStealerEXIFData
Author:adm1n_usa32
Description:Detects UmbralStealer by obvious comment in EXIF Data

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
SHELL_APIManipulates System Shellshell32.dll::ShellExecuteA

Comments