MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1ca80c889b40252a61040f48be8528a52d7fe6aa67ed83e8fdfe34d0808cb34d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XBinder


Vendor detections: 15


Intelligence 15 IOCs YARA 5 File information Comments

SHA256 hash: 1ca80c889b40252a61040f48be8528a52d7fe6aa67ed83e8fdfe34d0808cb34d
SHA3-384 hash: b5d0fc93776f254fde9f7eebef851a36352dd60fdaa25de0e42b238fcc20e6cad49532b2b4aaf73f078e5ca090443c63
SHA1 hash: 903b62a9a060f87b71ca42e8f3062e34ac03952f
MD5 hash: f3ac1ae11c989d964761ac6810433e89
humanhash: two-mountain-zulu-beryllium
File name:1ca80c889b40252a61040f48be8528a52d7fe6aa67ed83e8fdfe34d0808cb34d
Download: download sample
Signature XBinder
File size:398'848 bytes
First seen:2026-02-04 18:17:55 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'842 x AgentTesla, 19'774 x Formbook, 12'296 x SnakeKeylogger)
ssdeep 12288:/tiFvjfqd09rowhOLfxhl5gBNSl1jiwtTc9K:/tyridAhc5Gm1Ok
Threatray 127 similar samples on MalwareBazaar
TLSH T1BB84238922DB8222D171EE7352F3A471733E8E5E62423D6B454677CEBAF700685C127E
TrID 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.7% (.EXE) Win64 Executable (generic) (10522/11/4)
6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.1% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter Neiki
Tags:exe xbinder

Intelligence


File Origin
# of uploads :
1
# of downloads :
232
Origin country :
DE DE
Vendor Threat Intelligence
Malware configuration found for:
EvilCoder
Details
EvilCoder
extracted components, their filepaths, and possibly registry installation
Malware family:
n/a
ID:
1
File name:
Xeno.exe
Verdict:
Malicious activity
Analysis date:
2026-02-04 18:17:08 UTC
Tags:
evasion

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
dropper virus micro
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm fingerprint obfuscated packed reconnaissance vbnet
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-02-03T18:00:00Z UTC
Last seen:
2026-02-04T18:23:00Z UTC
Hits:
~10
Detections:
Trojan.Win32.Agent.sb Trojan.MSIL.Inject.sb HEUR:Trojan.MSIL.Fsysna.gen HEUR:Backdoor.MSIL.Crysan.gen Trojan.Win32.Vimditator.sb
Verdict:
inconclusive
YARA:
10 match(es)
Tags:
.Net Executable Managed .NET PE (Portable Executable) PE File Layout SOS: 0.22 Win 32 Exe x86
Threat name:
ByteCode-MSIL.Trojan.Cassiopeia
Status:
Malicious
First seen:
2026-02-04 02:51:13 UTC
File Type:
PE (.Net Exe)
Extracted files:
6
AV detection:
22 of 24 (91.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Looks up external IP address via web service
Unpacked files
SH256 hash:
1ca80c889b40252a61040f48be8528a52d7fe6aa67ed83e8fdfe34d0808cb34d
MD5 hash:
f3ac1ae11c989d964761ac6810433e89
SHA1 hash:
903b62a9a060f87b71ca42e8f3062e34ac03952f
SH256 hash:
1cea26353f1b17030f6692ed169f049903cd37d307a350e185b7ada7a68ca841
MD5 hash:
28794dae3fdf0c74ce3a649ff4cbafaf
SHA1 hash:
a140e170448d1f14d255e64e07e020a8a114aec6
SH256 hash:
46c962d8a5f8020b5077e6d91e1330c100af3c25944c890b80bb1699c762846a
MD5 hash:
90059d996813339e1b03f5fdd4f83db2
SHA1 hash:
cca2c80ede2757ad9edb14fd74e93e706d1b8ee8
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments