MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4c5ca5701285337a96298ebf994f8ba013d290c63afa65b5c2b05771fbbb9ed4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XWorm


Vendor detections: 15


Intelligence 15 IOCs YARA 8 File information Comments

SHA256 hash: 4c5ca5701285337a96298ebf994f8ba013d290c63afa65b5c2b05771fbbb9ed4
SHA3-384 hash: 172e2609c8e69b26318efcdb7127d4cadfd4d7056e54b65bb815381d7f2acee959f0e44ea8cf8303f79c523953dcdda2
SHA1 hash: 8405b9bf28accb6f1907fbe28d2536da4fba9fc9
MD5 hash: 0ec1f7cc17b6402cd2df150e0e5e92ca
humanhash: bulldog-kitten-may-hot
File name:SecuriteInfo.com.Win32.TrojanX-gen.2935.18945
Download: download sample
Signature XWorm
File size:327'168 bytes
First seen:2024-08-08 19:21:13 UTC
Last seen:2024-09-27 04:00:26 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 89d186e701948ed4026afa52bc6342f0 (3 x ZharkBot, 1 x LummaStealer, 1 x CryptBot)
ssdeep 6144:nx9ooeWfqpO3HS0f+KIXDyqR9NKtU5tyt7EJtdb/yw0cV3IOfe52GGZ2OGe+CKip:nx9onKM2+KIXrLGw0ci22OGe+CKiV9pz
Threatray 11 similar samples on MalwareBazaar
TLSH T19B649D11B541C032D6A110345B38BFB1892DEE350FA856FBB3D4497EAE702D2AB36B57
TrID 32.2% (.EXE) Win64 Executable (generic) (10523/12/4)
20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
13.7% (.EXE) Win32 Executable (generic) (4504/4/1)
6.2% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter SecuriteInfoCom
Tags:exe xworm

Intelligence


File Origin
# of uploads :
20
# of downloads :
395
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Win32.TrojanX-gen.2935.18945
Verdict:
Malicious activity
Analysis date:
2024-08-08 19:22:25 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
Discovery Execution Generic Infostealer Network Stealth Trojan Heur
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Searching for the window
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
epmicrosoft_visual_cc fingerprint lolbin microsoft_visual_cc shell32 wscript
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, DarkTortilla, RedLine, XWorm
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Creates HTML files with .exe extension (expired dropper behavior)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Drops PE files to the user root directory
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Potentially malicious time measurement code found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadey
Yara detected Amadeys stealer DLL
Yara detected AntiVM3
Yara detected DarkTortilla Crypter
Yara detected Generic Downloader
Yara detected Powershell download and execute
Yara detected RedLine Stealer
Yara detected UAC Bypass using CMSTP
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1490209 Sample: SecuriteInfo.com.Win32.Troj... Startdate: 08/08/2024 Architecture: WINDOWS Score: 100 187 Found malware configuration 2->187 189 Malicious sample detected (through community Yara rule) 2->189 191 Antivirus detection for URL or domain 2->191 193 25 other signatures 2->193 12 Cerker.exe 9 2->12         started        16 axplong.exe 2->16         started        19 SecuriteInfo.com.Win32.TrojanX-gen.2935.18945.exe 1 4 2->19         started        21 9 other processes 2->21 process3 dnsIp4 141 185.215.113.16 WHOLESALECONNECTIONSNL Portugal 12->141 143 185.216.214.225 SERVERDISCOUNTERserverdiscountercomDE Germany 12->143 145 188.114.97.3 CLOUDFLARENETUS European Union 12->145 109 C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe, PE32 12->109 dropped 111 C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exe, PE32 12->111 dropped 23 FRaqbC8wSA1XvpFVjCRGryWt.exe 3 12->23         started        26 IIZS2TRqf69aZbLAX3cf3edn.exe 15 6 12->26         started        30 schtasks.exe 1 12->30         started        147 185.196.11.123 SIMPLECARRIERCH Switzerland 16->147 113 C:\Users\user\AppData\Local\...\MYNEWRDX.exe, PE32 16->113 dropped 115 C:\Users\user\AppData\Local\...\FILE2233.exe, PE32+ 16->115 dropped 117 C:\Users\user\AppData\...\stealc_default.exe, PE32 16->117 dropped 123 11 other malicious files 16->123 dropped 149 Hides threads from debuggers 16->149 151 Tries to detect sandboxes / dynamic malware analysis system (registry check) 16->151 153 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 16->153 119 C:\Users\user\AppData\Local\...\Cerker.exe, PE32 19->119 dropped 121 C:\Users\user\...\Cerker.exe:Zone.Identifier, ASCII 19->121 dropped 155 Creates an undocumented autostart registry key 19->155 157 Creates multiple autostart registry keys 19->157 159 Contains functionality to inject code into remote processes 19->159 161 Uses schtasks.exe or at.exe to add and modify task schedules 19->161 32 Cerker.exe 19->32         started        34 schtasks.exe 1 19->34         started        163 Multi AV Scanner detection for dropped file 21->163 165 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 21->165 167 Hides that the sample has been downloaded from the Internet (zone.identifier) 21->167 169 Injects a PE file into a foreign processes 21->169 36 ednfosi.exe 21->36         started        38 ednfosi.exe 21->38         started        40 ednfosi.exe 21->40         started        file5 signatures6 process7 dnsIp8 199 Machine Learning detection for dropped file 23->199 201 Hides that the sample has been downloaded from the Internet (zone.identifier) 23->201 203 Injects a PE file into a foreign processes 23->203 42 FRaqbC8wSA1XvpFVjCRGryWt.exe 23->42         started        45 FRaqbC8wSA1XvpFVjCRGryWt.exe 23->45         started        133 208.95.112.1 TUT-ASUS United States 26->133 99 C:\Users\user\Windows.exe, PE32 26->99 dropped 205 Antivirus detection for dropped file 26->205 207 Multi AV Scanner detection for dropped file 26->207 209 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 26->209 215 3 other signatures 26->215 47 schtasks.exe 26->47         started        49 conhost.exe 30->49         started        211 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 32->211 213 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 32->213 51 conhost.exe 34->51         started        file9 signatures10 process11 file12 97 C:\Users\user\AppData\Local\...\ednfosi.exe, PE32 42->97 dropped 53 ednfosi.exe 42->53         started        56 conhost.exe 47->56         started        process13 signatures14 195 Hides that the sample has been downloaded from the Internet (zone.identifier) 53->195 197 Injects a PE file into a foreign processes 53->197 58 ednfosi.exe 53->58         started        62 ednfosi.exe 53->62         started        process15 dnsIp16 135 185.208.158.115 SIMPLECARRER2IT Switzerland 58->135 137 140.82.121.3 GITHUBUS United States 58->137 139 185.199.110.133 FASTLYUS Netherlands 58->139 101 C:\Users\user\AppData\Local\...\file3333.exe, PE32+ 58->101 dropped 103 C:\Users\user\AppData\Local\...\kitty.exe, PE32 58->103 dropped 105 C:\Users\user\AppData\...\7694d27252.exe, PE32 58->105 dropped 107 3 other malicious files 58->107 dropped 64 file3333.exe 58->64         started        67 7694d27252.exe 58->67         started        70 kitty.exe 58->70         started        file17 process18 file19 171 Multi AV Scanner detection for dropped file 64->171 173 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 64->173 175 Writes to foreign memory regions 64->175 183 3 other signatures 64->183 72 RegSvcs.exe 64->72         started        77 powershell.exe 64->77         started        79 WerFault.exe 64->79         started        83 2 other processes 64->83 87 C:\Users\user\AppData\Local\...\axplong.exe, PE32 67->87 dropped 177 Antivirus detection for dropped file 67->177 179 Detected unpacking (changes PE section rights) 67->179 181 Machine Learning detection for dropped file 67->181 185 6 other signatures 67->185 81 axplong.exe 67->81         started        signatures20 process21 dnsIp22 125 147.45.60.44 FREE-NET-ASFREEnetEU Russian Federation 72->125 127 104.20.3.235 CLOUDFLARENETUS United States 72->127 131 4 other IPs or domains 72->131 89 C:\Users\...\yyFfx6AhV88RLEAxPS6Uuxgq.exe, PE32 72->89 dropped 91 C:\Users\...\oHniPZfEkC9KZdgLhKykZwrZ.exe, PE32 72->91 dropped 93 C:\Users\...\hRmCs7VepTbNcl0Ov7O1JmhR.exe, PE32 72->93 dropped 95 14 other malicious files 72->95 dropped 217 Creates HTML files with .exe extension (expired dropper behavior) 72->217 219 Loading BitLocker PowerShell Module 77->219 85 conhost.exe 77->85         started        129 20.189.173.21 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 79->129 221 Detected unpacking (changes PE section rights) 81->221 223 Tries to detect sandboxes and other dynamic analysis tools (window names) 81->223 225 Tries to evade debugger and weak emulator (self modifying code) 81->225 227 3 other signatures 81->227 file23 signatures24 process25
Threat name:
Win32.Trojan.Amadey
Status:
Malicious
First seen:
2024-08-08 14:04:45 UTC
File Type:
PE (Exe)
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Suspicious use of WriteProcessMemory
Program crash
System Location Discovery: System Language Discovery
Unpacked files
SH256 hash:
4c5ca5701285337a96298ebf994f8ba013d290c63afa65b5c2b05771fbbb9ed4
MD5 hash:
0ec1f7cc17b6402cd2df150e0e5e92ca
SHA1 hash:
8405b9bf28accb6f1907fbe28d2536da4fba9fc9
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

XWorm

Executable exe 4c5ca5701285337a96298ebf994f8ba013d290c63afa65b5c2b05771fbbb9ed4

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
ole32.dll::CoInitializeSecurity
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteA
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessW
KERNEL32.dll::CreateProcessA
KERNEL32.dll::OpenProcess
KERNEL32.dll::VirtualAllocEx
KERNEL32.dll::WriteProcessMemory
KERNEL32.dll::CloseHandle
WININET.dll::InternetCloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetStartupInfoW
KERNEL32.dll::GetCommandLineA
KERNEL32.dll::GetCommandLineW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::ReadConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleOutputCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CopyFileA
KERNEL32.dll::CreateDirectoryA
KERNEL32.dll::CreateFileW
WIN_BASE_USER_APIRetrieves Account InformationKERNEL32.dll::GetComputerNameA
ADVAPI32.dll::GetUserNameA
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegOpenKeyExA
ADVAPI32.dll::RegQueryValueExA
ADVAPI32.dll::RegSetValueExA

Comments