MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 55bdb3c56d2bddb51565d4035f41cc4f746f5062a4ab4f429ad0634e41df990d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XWorm


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: 55bdb3c56d2bddb51565d4035f41cc4f746f5062a4ab4f429ad0634e41df990d
SHA3-384 hash: 394863d570cd45f7c9d29ca14780bc814399d1f496360d040999e8b67ef1ddbcb2b3a59a858ca733dac2c4231b3c6e59
SHA1 hash: 6a4d76cc0a8a7dfaa928234c52eadea3353932ce
MD5 hash: 16ea81c02e0165de711b77f30ba43e86
humanhash: pizza-edward-comet-july
File name:invoice-1645080830.pdf (29).js
Download: download sample
Signature XWorm
File size:71'472 bytes
First seen:2025-12-30 08:58:53 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 768:I8w/h62/jWs6oS+xISN0vkCmlyx5QR9SMkb/tgpeF5/Mj/TqSOY8/EyfbtyfItID:I9l/AoSSMBV3usrdkTS6
TLSH T13463186F209768D50A537975B0793ACE13147E450863B2042EBFB1227D0AF7933A9F9E
Magika txt
Reporter JAMESWT_WT
Tags:js xworm

Intelligence


File Origin
# of uploads :
1
# of downloads :
66
Origin country :
IT IT
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
99.1%
Tags:
xtreme virus overt
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
base64 evasive masquerade obfuscated repaired
Verdict:
Malicious
File Type:
js
First seen:
2025-12-30T06:22:00Z UTC
Last seen:
2025-12-30T22:39:00Z UTC
Hits:
~100
Detections:
HEUR:Trojan.Script.Agent.gen HEUR:Trojan.Script.Generic HEUR:Trojan.PowerShell.Generic PDM:Trojan.Win32.Generic NetTool.PowerShellUA.HTTP.C&C NetTool.PowerShellGet.HTTP.C&C
Gathering data
Threat name:
Script-JS.Trojan.XWorm
Status:
Malicious
First seen:
2025-12-30 08:53:04 UTC
File Type:
Text (JavaScript)
AV detection:
5 of 36 (13.89%)
Threat level:
  5/5
Gathering data
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments