MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 220e5c0ee3fec540448955bb9f2c5324c0a01d65323b48b00caed7a45d5df6ef. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XWorm


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 220e5c0ee3fec540448955bb9f2c5324c0a01d65323b48b00caed7a45d5df6ef
SHA3-384 hash: 40dbee8e36e2931b4049e35907f061743b551467c9d262835fd8a7a5ea539af5d818a4a9c262718cd0e691586274add1
SHA1 hash: 891fec3e2a392c960973f5cb2052a47126b06963
MD5 hash: 75fee0eb83d4793d7e1c8c992068afd3
humanhash: undress-uniform-utah-six
File name:PAYMENT-INV-20251009-001.vbs
Download: download sample
Signature XWorm
File size:13'564 bytes
First seen:2025-10-21 11:54:42 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 192:Y4HDOOBLf5sI1BHugicFpp34b3p8LodzCGxS5wdHOBXQgL4stJSWV:7vJ5THt/A3p8LodzCGIQgS8
Threatray 2'513 similar samples on MalwareBazaar
TLSH T14052D13B9C5CA170E3AFBB06DE6DED6A8274A1EB1A1F0183705C6D401BB72CDD74548A
Magika vba
Reporter Anonymous
Tags:vbs xworm

Intelligence


File Origin
# of uploads :
1
# of downloads :
76
Origin country :
PL PL
Vendor Threat Intelligence
Verdict:
Suspicious
Score:
50%
Tags:
obfuscate xtreme spawn
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
base64 evasive masquerade obfuscated powershell
Verdict:
Malicious
File Type:
vbs
First seen:
2025-10-21T06:30:00Z UTC
Last seen:
2025-10-23T09:14:00Z UTC
Hits:
~100
Detections:
Trojan.Agentb.TCP.C&C Backdoor.Agent.TCP.C&C Trojan.JS.SAgent.sb HEUR:Trojan.Script.Generic
Verdict:
Malware
YARA:
1 match(es)
Tags:
Scripting.FileSystemObject VBScript
Threat name:
Win32.Trojan.Egairtigado
Status:
Malicious
First seen:
2025-10-21 11:55:55 UTC
File Type:
Text (VBS)
AV detection:
9 of 24 (37.50%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xworm discovery execution persistence rat trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
Detect Xworm Payload
Process spawned unexpected child process
Xworm
Xworm family
Malware Config
C2 Extraction:
178.16.54.37:19601
Dropper Extraction:
https://ia800609.us.archive.org/9/items/optimized_msi_20251021_0546/optimized_MSI.png
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments