MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6631e7fad1ecda70e50c7d29fcbd222c742ff67e658050146307b4e48a64b186. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XWorm


Vendor detections: 11


Intelligence 11 IOCs YARA 1 File information Comments

SHA256 hash: 6631e7fad1ecda70e50c7d29fcbd222c742ff67e658050146307b4e48a64b186
SHA3-384 hash: 2e3aaf62fbdf709702e60fa29d111f031affdd3de9618065eea009d90f39bb75c0996e923f7480a7ef67cf621626f800
SHA1 hash: d5d499e403843d0a6a978f7fd7389cb06569ba85
MD5 hash: 90460577f410e7ebde480575118d1d97
humanhash: texas-west-king-victor
File name:Scanned-NIE-000876.pdf.lnk
Download: download sample
Signature XWorm
File size:2'935 bytes
First seen:2025-10-09 20:24:02 UTC
Last seen:Never
File type:Shortcut (lnk) lnk
MIME type:application/x-ms-shortcut
ssdeep 48:8IQIJ8qdWhbfUKBr/qsvUKabXuHyV3P76pxjIlcUKQpoGvsvUK:8Ewb7J/qsLuuA/SxIlaYBsL
Threatray 2'504 similar samples on MalwareBazaar
TLSH T1A251DC1262E5166AE376463054F3D9A297377DA1F001DA1C80A1835A1473E18CEA9FFB
Magika lnk
Reporter smica83
Tags:5-253-59-191 lnk xworm

Intelligence


File Origin
# of uploads :
1
# of downloads :
61
Origin country :
HU HU
Vendor Threat Intelligence
Verdict:
Malicious
Score:
81.4%
Tags:
shell spawn sage
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
masquerade obfuscated opendir opendir webdav
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
52 / 100
Signature
Suricata IDS alerts for network traffic
Uses an obfuscated file name to hide its real file extension (double extension)
Behaviour
Behavior Graph:
Verdict:
inconclusive
YARA:
2 match(es)
Tags:
LNK
Threat name:
Binary.Trojan.Generic
Status:
Suspicious
First seen:
2025-10-09 18:27:22 UTC
File Type:
Binary
AV detection:
3 of 38 (7.89%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Script_in_LNK
Author:@bartblaze
Description:Identifies scripting artefacts in shortcut (LNK) files.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments