MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2bf32c10e21945e9c1b851c43930bf64be9272d17f21d3a9715af4b391dc37b4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XWorm


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 2bf32c10e21945e9c1b851c43930bf64be9272d17f21d3a9715af4b391dc37b4
SHA3-384 hash: c487dd225854405936b8fa20ed2acd83651f4a1023d58cf7934256e981437d548339841d01698e2e487270d93e69dca3
SHA1 hash: e17d7fb2b8021a4271d7676e46036571732749b7
MD5 hash: 5eebd07e30abe60a89057323d28a64c3
humanhash: princess-emma-papa-ohio
File name:invoice-1645080830.pdf (44).js
Download: download sample
Signature XWorm
File size:73'484 bytes
First seen:2025-12-30 08:57:31 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 768:I8w/h62/jWs6oS+xISN0vozqgl/dkfScBYrwz2y8kTAlGB:I9l/AoSSMYdusrdkTS6
TLSH T1ED730AC00FE180CCA1FAF756EC95D5BD2F1A3E315D8DD622380AAFB97696C222105E4D
Magika txt
Reporter JAMESWT_WT
Tags:js xworm

Intelligence


File Origin
# of uploads :
1
# of downloads :
60
Origin country :
IT IT
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
99.1%
Tags:
xtreme virus overt
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
base64 evasive masquerade obfuscated repaired
Result
Gathering data
Gathering data
Threat name:
Script-JS.Trojan.XWorm
Status:
Malicious
First seen:
2025-12-30 08:53:02 UTC
File Type:
Text (JavaScript)
AV detection:
5 of 36 (13.89%)
Threat level:
  5/5
Gathering data
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments