MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 60a6d2666a2fcff382041c20273f99cc13f1998d11522fb772eac2aeed83f37c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XWorm


Vendor detections: 10


Intelligence 10 IOCs 1 YARA 2 File information Comments

SHA256 hash: 60a6d2666a2fcff382041c20273f99cc13f1998d11522fb772eac2aeed83f37c
SHA3-384 hash: 8c1b5255e75b571907cd13aee12885bb84add21c0ac3970a89a392f86b9f2bfec34387b250258f0d1554a814738ca45d
SHA1 hash: 23cf52ad5b763cab67db8cdb67ab59ffa3945e9b
MD5 hash: 7881bb77e423d3de66d554940f5ba65d
humanhash: asparagus-winter-crazy-beryllium
File name:PURCHASE ORDER P31080 AMH TECHNOLOGIES S-B009.js
Download: download sample
Signature XWorm
File size:209'161 bytes
First seen:2025-08-25 11:00:36 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 3072:cfHWBFun2sj1+J9t4wm19LcO29JskRmmcPb5czIMtPy9ijKy2TtL2hBip3YHOKmG:gHWBFu2sj1+J9t4um/czrBjKy2TtuuK1
Threatray 228 similar samples on MalwareBazaar
TLSH T1BF14F83DD5A0ECC8036E30D5916D3B4A119D6FE3FAB0AB1CE9D92DAB1C3445D9B7A108
Magika javascript
Reporter abuse_ch
Tags:js xworm


Avatar
abuse_ch
XWorm C2:
185.157.162.101:1111

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
185.157.162.101:1111 https://threatfox.abuse.ch/ioc/1574160/

Intelligence


File Origin
# of uploads :
1
# of downloads :
67
Origin country :
NL NL
Vendor Threat Intelligence
Verdict:
Malicious
Score:
92.5%
Tags:
obfuscate autorun xtreme shell
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm obfuscated obfuscated
Verdict:
Malicious
File Type:
js
First seen:
2025-08-25T07:01:00Z UTC
Last seen:
2025-08-25T07:01:00Z UTC
Hits:
~10
Detections:
PDM:Trojan.Win32.Generic Backdoor.Agent.TCP.C&C Trojan-Downloader.JS.Cryptoload.sb HEUR:Trojan.Script.Generic HEUR:Trojan.BAT.Obfus.gen
Result
Threat name:
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
.NET source code contains a sample name check
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
C2 URLs / IPs found in malware configuration
Creates processes via WMI
Drops script or batch files to the startup folder
Found malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Sample has a suspicious name (potential lure to open the executable)
Sample uses string decryption to hide its real strings
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Drops script at startup location
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: PowerShell Base64 Encoded IEX Cmdlet
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Uses dynamic DNS services
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1764468 Sample: PURCHASE ORDER P31080 AMH T... Startdate: 25/08/2025 Architecture: WINDOWS Score: 100 105 duskesthostplug.duckdns.org 2->105 115 Found malware configuration 2->115 117 Malicious sample detected (through community Yara rule) 2->117 119 Yara detected XWorm 2->119 123 13 other signatures 2->123 10 wscript.exe 1 1 2->10         started        14 cmd.exe 1 2->14         started        16 cmd.exe 1 2->16         started        18 8 other processes 2->18 signatures3 121 Uses dynamic DNS services 105->121 process4 dnsIp5 85 C:\Users\user\AppData\...85euralRouter.bat, ASCII 10->85 dropped 129 Wscript starts Powershell (via cmd or directly) 10->129 131 Windows Scripting host queries suspicious COM object (likely to drop second stage) 10->131 133 Suspicious execution chain found 10->133 135 Creates processes via WMI 10->135 21 cmd.exe 1 10->21         started        24 cmd.exe 14->24         started        26 conhost.exe 14->26         started        28 cmd.exe 1 16->28         started        30 conhost.exe 16->30         started        107 127.0.0.1 unknown unknown 18->107 32 cmd.exe 1 18->32         started        34 cmd.exe 18->34         started        36 cmd.exe 18->36         started        38 11 other processes 18->38 file6 signatures7 process8 signatures9 125 Suspicious powershell command line found 21->125 127 Wscript starts Powershell (via cmd or directly) 21->127 40 cmd.exe 1 21->40         started        42 conhost.exe 21->42         started        44 cmd.exe 24->44         started        47 cmd.exe 1 28->47         started        49 cmd.exe 1 32->49         started        51 cmd.exe 34->51         started        53 cmd.exe 36->53         started        55 cmd.exe 38->55         started        57 3 other processes 38->57 process10 signatures11 59 cmd.exe 2 40->59         started        67 2 other processes 44->67 141 Suspicious powershell command line found 47->141 143 Wscript starts Powershell (via cmd or directly) 47->143 69 2 other processes 47->69 62 powershell.exe 49->62         started        65 conhost.exe 49->65         started        71 2 other processes 51->71 73 2 other processes 53->73 75 2 other processes 55->75 77 6 other processes 57->77 process12 file13 137 Suspicious powershell command line found 59->137 139 Wscript starts Powershell (via cmd or directly) 59->139 79 powershell.exe 4 30 59->79         started        83 conhost.exe 59->83         started        87 C:\Users\user\AppData\Roaming\...\3654.bat, ASCII 62->87 dropped 89 C:\Users\user\AppData\Roaming\...\66da.bat, ASCII 67->89 dropped 91 C:\Users\user\AppData\Roaming\...\e003.bat, ASCII 69->91 dropped 93 C:\Users\user\AppData\Roaming\...\dcdc.bat, ASCII 71->93 dropped 95 C:\Users\user\AppData\Roaming\...\4c6d.bat, ASCII 73->95 dropped 97 C:\Users\user\AppData\Roaming\...\2a0f.bat, ASCII 75->97 dropped 99 C:\Users\user\AppData\Roaming\...\da4b.bat, ASCII 77->99 dropped 101 C:\Users\user\AppData\Roaming\...\381c.bat, ASCII 77->101 dropped signatures14 process15 file16 103 C:\Users\user\AppData\Roaming\...\08a7.bat, ASCII 79->103 dropped 109 Drops script or batch files to the startup folder 79->109 111 Found suspicious powershell code related to unpacking or dynamic code loading 79->111 113 Loading BitLocker PowerShell Module 79->113 signatures17
Gathering data
Threat name:
Win32.Backdoor.Xworm
Status:
Malicious
First seen:
2025-08-25 11:04:34 UTC
File Type:
Text
AV detection:
9 of 24 (37.50%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xworm defense_evasion execution rat trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
Command and Scripting Interpreter: PowerShell
Drops startup file
Badlisted process makes network request
Modifies trusted root certificate store through registry
Detect Xworm Payload
Process spawned unexpected child process
Xworm
Xworm family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:SUSP_PS1_JAB_Pattern_Jun22_1
Author:Florian Roth (Nextron Systems)
Description:Detects suspicious UTF16 and Base64 encoded PowerShell code that starts with a $ sign and a single char variable
Reference:Internal Research
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments