MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 109b233024348f26571c086aa6aae6eeedb062a704b4a23e0d87dd2234659103. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XWorm


Vendor detections: 11


Intelligence 11 IOCs YARA 22 File information Comments

SHA256 hash: 109b233024348f26571c086aa6aae6eeedb062a704b4a23e0d87dd2234659103
SHA3-384 hash: b891428386e142ee993fe8956868583fd12c7e5f3f9d8e77e3c4442b60eb10c4df9b0407cea0e03939b33fd1f79cf25d
SHA1 hash: f6ac1b40817dae7058cfec365974e03ea68538e9
MD5 hash: 1ca66f5770cff04b03e200aab601cdb8
humanhash: carolina-crazy-purple-queen
File name:1ca66f5770cff04b03e200aab601cdb8.exe
Download: download sample
Signature XWorm
File size:3'564'544 bytes
First seen:2026-03-09 15:39:42 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d42595b695fc008ef2c56aabd8efd68e (327 x Vidar, 92 x Rhadamanthys, 92 x Stealc)
ssdeep 49152:UToPNLT8P+DQdNqi46i2t9ZBvc7+pTcsOG5epiv+4:UCbgFC9
TLSH T160F56B47BC9188F6C0A9637188B752427B76B8491F3223CB2E50B7782E72BD05DB576C
TrID 33.1% (.EXE) Win64 Executable (generic) (6522/11/2)
25.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.4% (.ICL) Windows Icons Library (generic) (2059/9)
10.3% (.EXE) OS/2 Executable (generic) (2029/13)
10.1% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter abuse_ch
Tags:exe xworm

Intelligence


File Origin
# of uploads :
1
# of downloads :
170
Origin country :
SE SE
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
1ca66f5770cff04b03e200aab601cdb8.exe
Verdict:
Suspicious activity
Analysis date:
2026-03-09 15:40:22 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
vmdetect dropper virus sage
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm anti-vm base64 crypto golang packed
Result
Threat name:
DonutLoader, XWorm
Detection:
malicious
Classification:
troj.expl.evad.mine
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Compiles code for process injection (via .Net compiler)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to registers a callback to get notified when the system is suspended or resumed (often done by Miners)
Creates a thread in another existing process (thread injection)
Found malware configuration
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Obfuscated command line found
Potentially malicious time measurement code found
Powershell is started from unusual location (likely to bypass HIPS)
Query firmware table information (likely to detect VMs)
Reads the Security eventlog
Reads the System eventlog
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powershell Decrypt And Execute Base64 Data
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Unusual module load detection (module proxying)
Uses cmd line tools excessively to alter registry or file data
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
WScript reads language and country specific registry keys (likely country aware script)
Wscript starts Powershell (via cmd or directly)
Yara detected DonutLoader
Yara detected Powershell decode and execute
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1880723 Sample: 5nFYyInsmG.exe Startdate: 09/03/2026 Architecture: WINDOWS Score: 100 92 ip-api.com 2->92 94 ax-0003.ax-msedge.net 2->94 96 3 other IPs or domains 2->96 136 Suricata IDS alerts for network traffic 2->136 138 Found malware configuration 2->138 140 Malicious sample detected (through community Yara rule) 2->140 142 15 other signatures 2->142 15 5nFYyInsmG.exe 3 2->15         started        19 wscript.exe 2->19         started        21 explorer.exe 2->21         started        24 svchost.exe 1 1 2->24         started        signatures3 process4 dnsIp5 88 C:\...\614f2712cb0eb199b8c0b3bbd118416b.bat, DOS 15->88 dropped 90 C:\...\5cb8955da55018b598ef94c0b8368d96.cmd, ASCII 15->90 dropped 104 Suspicious powershell command line found 15->104 106 Bypasses PowerShell execution policy 15->106 108 Contains functionality to registers a callback to get notified when the system is suspended or resumed (often done by Miners) 15->108 110 Potentially malicious time measurement code found 15->110 26 powershell.exe 12 15->26         started        28 conhost.exe 15->28         started        112 Wscript starts Powershell (via cmd or directly) 19->112 114 Windows Scripting host queries suspicious COM object (likely to drop second stage) 19->114 116 WScript reads language and country specific registry keys (likely country aware script) 19->116 30 cmd.exe 19->30         started        98 ax-0003.ax-msedge.net 150.171.28.12, 443, 49696 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 21->98 118 System process connects to network (likely due to code injection or exploit) 21->118 120 Query firmware table information (likely to detect VMs) 21->120 100 127.0.0.1 unknown unknown 24->100 file6 signatures7 process8 process9 32 cmd.exe 1 26->32         started        35 conhost.exe 30->35         started        signatures10 122 Suspicious powershell command line found 32->122 124 Wscript starts Powershell (via cmd or directly) 32->124 126 Obfuscated command line found 32->126 128 Uses cmd line tools excessively to alter registry or file data 32->128 37 powershell.exe 12 32->37         started        39 conhost.exe 32->39         started        process11 process12 41 cmd.exe 1 37->41         started        process13 43 powershell.exe 12 41->43         started        45 powershell.exe 19 41->45         started        48 conhost.exe 41->48         started        signatures14 50 cmd.exe 1 43->50         started        162 Loading BitLocker PowerShell Module 45->162 process15 file16 76 C:\Users\user\Downloads\CPU.exe, PE32+ 50->76 dropped 53 CPU.exe 50->53         started        57 CPU.exe 50->57         started        59 CPU.exe 50->59         started        61 5 other processes 50->61 process17 file18 80 C:\...\ocZpcnZkaclvkdhsyaocvoaxkzpaiywq.xml, XML 53->80 dropped 82 C:\Users\user\AppData\...\knwrpwztkhwg.vbs, ASCII 53->82 dropped 84 C:\Users\user\AppData\...\4m5svzqt.cmdline, Unicode 53->84 dropped 86 C:\Users\user\AppData\Local\...\4m5svzqt.0.cs, Unicode 53->86 dropped 144 Injects code into the Windows Explorer (explorer.exe) 53->144 146 Writes to foreign memory regions 53->146 148 Powershell is started from unusual location (likely to bypass HIPS) 53->148 150 Creates a thread in another existing process (thread injection) 53->150 63 explorer.exe 53->63 injected 67 csc.exe 53->67         started        70 schtasks.exe 53->70         started        72 2 other processes 53->72 152 Uses schtasks.exe or at.exe to add and modify task schedules 57->152 154 Compiles code for process injection (via .Net compiler) 57->154 156 Reads the Security eventlog 57->156 158 Reads the System eventlog 59->158 160 Loading BitLocker PowerShell Module 61->160 signatures19 process20 dnsIp21 102 ip-api.com 208.95.112.1, 49694, 80 TUT-ASUS United States 63->102 130 System process connects to network (likely due to code injection or exploit) 63->130 132 Unusual module load detection (module proxying) 63->132 134 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 63->134 78 C:\Users\user\AppData\Local\...\4m5svzqt.dll, PE32 67->78 dropped 74 cvtres.exe 67->74         started        file22 signatures23 process24
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Backdoor.Xworm
Status:
Suspicious
First seen:
2026-03-06 03:41:00 UTC
File Type:
PE+ (Exe)
AV detection:
18 of 37 (48.65%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: PowerShell
Unpacked files
SH256 hash:
109b233024348f26571c086aa6aae6eeedb062a704b4a23e0d87dd2234659103
MD5 hash:
1ca66f5770cff04b03e200aab601cdb8
SHA1 hash:
f6ac1b40817dae7058cfec365974e03ea68538e9
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectGoMethodSignatures
Author:Wyatt Tauber
Description:Detects Go method signatures in unpacked Go binaries
Rule name:Detect_Go_GOMAXPROCS
Author:Obscurity Labs LLC
Description:Detects Go binaries by the presence of runtime.GOMAXPROCS in the runtime metadata
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:GoBinTest
Rule name:golang
Rule name:Golangmalware
Author:Dhanunjaya
Description:Malware in Golang
Rule name:golang_binary_string
Description:Golang strings present
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:golang_duffcopy_amd64
Rule name:Golang_Find_CSC846
Author:Ashar Siddiqui
Description:Find Go Signatuers
Rule name:Golang_Find_CSC846_Simple
Author:Ashar Siddiqui
Description:Find Go Signatuers
Rule name:HiveRansomware
Author:Dhanunjaya
Description:Yara Rule To Detect Hive V4 Ransomware
Rule name:ProgramLanguage_Golang
Author:albertzsigovits
Description:Application written in Golang programming language
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:Suspicious_Golang_Binary
Author:Tim Machac
Description:Triage: Golang-compiled binary with suspicious OS/persistence/network strings (not family-specific)
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments