MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2bd21cf977d4b6792c2170618fd428a4335b7bf8c909f0dd47ecc65aedf9cd9a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XWorm


Vendor detections: 14


Intelligence 14 IOCs YARA 3 File information Comments 1

SHA256 hash: 2bd21cf977d4b6792c2170618fd428a4335b7bf8c909f0dd47ecc65aedf9cd9a
SHA3-384 hash: 4dba620f5f5e8f88f71d38ec6bc39c7e217283f7f8c66afa5f2952a161dca5538dc60370ecb470ea4deb2000440142cb
SHA1 hash: e6f7f7d4e06c9948d062a5bad25da7d6f2ce1199
MD5 hash: 801de46b2c66cd9de4e42994e453b705
humanhash: kentucky-snake-apart-lactose
File name:801de46b2c66cd9de4e42994e453b705
Download: download sample
Signature XWorm
File size:17'003'520 bytes
First seen:2024-06-06 18:15:23 UTC
Last seen:2024-06-06 19:26:13 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'607 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 393216:J3e2a9uurW2iUDWyoPmhPl61L/b/GeROY5CFPnaTTkZE:J309Lrj1rhN61TyRPuTk
TLSH T1D7073351DD0D0A0382F372DE59D7929E1A3A3D8FBA2A11225D6AE0C3B50D2149DDFF2C
TrID 75.9% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.9% (.EXE) Win64 Executable (generic) (10523/12/4)
4.6% (.EXE) Win32 Executable (generic) (4504/4/1)
2.1% (.ICL) Windows Icons Library (generic) (2059/9)
2.1% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter zbetcheckin
Tags:32 exe xworm

Intelligence


File Origin
# of uploads :
2
# of downloads :
372
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2bd21cf977d4b6792c2170618fd428a4335b7bf8c909f0dd47ecc65aedf9cd9a.exe
Verdict:
Malicious activity
Analysis date:
2024-06-06 18:18:41 UTC
Tags:
discord evasion xworm python

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file in the %AppData% directory
Creating a process from a recently created file
Creating a file
Creating a file in the %temp% subdirectories
Connection attempt
Using the Windows Management Instrumentation requests
Delayed reading of the file
Running batch commands
Creating a process with a hidden window
Launching a process
Searching for synchronization primitives
DNS request
Sending a custom TCP request
Reading critical registry keys
Sending an HTTP GET request
Unauthorized injection to a recently created process
Stealing user critical data
Launching a tool to kill processes
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Result
Threat name:
Python Stealer, Creal Stealer, XWorm
Detection:
malicious
Classification:
troj.adwa.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Drops PE files to the startup folder
Found malware configuration
Found pyInstaller with non standard icon
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal communication platform credentials (via file / registry access)
Yara detected Creal Stealer
Yara detected Generic Python Stealer
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1453288 Sample: ZK9XFb424l.exe Startdate: 06/06/2024 Architecture: WINDOWS Score: 100 101 geolocation-db.com 2->101 103 store10.gofile.io 2->103 105 4 other IPs or domains 2->105 129 Snort IDS alert for network traffic 2->129 131 Found malware configuration 2->131 133 Malicious sample detected (through community Yara rule) 2->133 137 12 other signatures 2->137 10 ZK9XFb424l.exe 4 2->10         started        13 Updatesys.exe 2->13         started        signatures3 135 Tries to detect the country of the analysis system (by using the IP) 101->135 process4 file5 79 C:\Users\user\AppData\...\Updatesystem.exe, PE32 10->79 dropped 81 C:\Users\user\AppData\Roaming\Updatesys.exe, PE32+ 10->81 dropped 83 C:\Users\user\AppData\...\ZK9XFb424l.exe.log, CSV 10->83 dropped 15 Updatesys.exe 100 10->15         started        19 Updatesystem.exe 2 10->19         started        85 C:\Users\user\AppData\Local\...\win32api.pyd, PE32+ 13->85 dropped 87 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 13->87 dropped 89 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+ 13->89 dropped 91 69 other files (none is malicious) 13->91 dropped 22 Updatesys.exe 13->22         started        process6 dnsIp7 93 C:\Users\user\AppData\Local\...\win32api.pyd, PE32+ 15->93 dropped 95 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 15->95 dropped 97 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+ 15->97 dropped 99 69 other files (none is malicious) 15->99 dropped 121 Drops PE files to the startup folder 15->121 123 Found pyInstaller with non standard icon 15->123 24 Updatesys.exe 11 15->24         started        107 185.91.127.220, 49707, 49724, 49731 VIRTUAL1GB United Kingdom 19->107 29 WerFault.exe 19->29         started        125 Tries to harvest and steal browser information (history, passwords, etc) 22->125 127 Tries to steal communication platform credentials (via file / registry access) 22->127 31 cmd.exe 22->31         started        33 cmd.exe 22->33         started        35 cmd.exe 22->35         started        37 5 other processes 22->37 file8 signatures9 process10 dnsIp11 109 geolocation-db.com 159.89.102.253, 443, 49711, 49735 DIGITALOCEAN-ASNUS United States 24->109 111 api.gofile.io 151.80.29.83, 443, 49710, 49734 OVHFR Italy 24->111 113 2 other IPs or domains 24->113 77 C:\Users\user\AppData\...\Updatesys.exe, PE32+ 24->77 dropped 139 Tries to steal communication platform credentials (via file / registry access) 24->139 39 cmd.exe 1 24->39         started        41 cmd.exe 1 24->41         started        43 cmd.exe 1 24->43         started        50 5 other processes 24->50 45 curl.exe 31->45         started        48 conhost.exe 31->48         started        52 2 other processes 33->52 54 2 other processes 35->54 56 8 other processes 37->56 file12 signatures13 process14 dnsIp15 58 curl.exe 1 39->58         started        61 conhost.exe 39->61         started        63 curl.exe 1 41->63         started        65 conhost.exe 41->65         started        67 conhost.exe 43->67         started        69 tasklist.exe 1 43->69         started        119 store1.gofile.io 45.112.123.227, 443, 49739, 49743 AMAZON-02US Singapore 45->119 71 conhost.exe 50->71         started        73 curl.exe 50->73         started        75 6 other processes 50->75 process16 dnsIp17 115 store10.gofile.io 31.14.70.252, 443, 49715, 49723 LINKER-ASFR Virgin Islands (BRITISH) 58->115 117 127.0.0.1 unknown unknown 58->117
Threat name:
Win32.Trojan.AsyncRAT
Status:
Malicious
First seen:
2024-06-06 08:13:11 UTC
File Type:
PE (.Net Exe)
Extracted files:
4
AV detection:
22 of 24 (91.67%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:xworm pyinstaller rat spyware stealer trojan
Behaviour
Enumerates processes with tasklist
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Detects Pyinstaller
Enumerates physical storage devices
Accesses cryptocurrency files/wallets, possible credential harvesting
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Detect Xworm Payload
Xworm
Malware Config
C2 Extraction:
185.91.127.220:7000
Unpacked files
SH256 hash:
e9f28544b1ec1cbae564f0924787ffe518ce6539ef659a2bd987af628bc818e7
MD5 hash:
d6b82f7d78ab802f7b244c2b841755d3
SHA1 hash:
78fa3dd055dc350e2faed0a5e840545fece1dfd9
Detections:
XWorm MALWARE_Win_XWorm INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA MALWARE_Win_AsyncRAT
SH256 hash:
2bd21cf977d4b6792c2170618fd428a4335b7bf8c909f0dd47ecc65aedf9cd9a
MD5 hash:
801de46b2c66cd9de4e42994e453b705
SHA1 hash:
e6f7f7d4e06c9948d062a5bad25da7d6f2ce1199
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

XWorm

Executable exe 2bd21cf977d4b6792c2170618fd428a4335b7bf8c909f0dd47ecc65aedf9cd9a

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments



Avatar
zbet commented on 2024-06-06 18:15:24 UTC

url : hxxp://77.91.77.81/lend/next.exe