MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6a4c87064969595078355dae42918fc19c3b71f422d6b5af9cee50a2af2d7b88. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XWorm


Vendor detections: 19


Intelligence 19 IOCs YARA 5 File information Comments

SHA256 hash: 6a4c87064969595078355dae42918fc19c3b71f422d6b5af9cee50a2af2d7b88
SHA3-384 hash: 93eee4d2753bbdc2f4b102963a4a5e90b00b6538983276ab3d9ab5c467ee1a809184f28415f603c2bc49c6f7a68b2592
SHA1 hash: ed6cb1b6d742f644ea2d1450c84a715d0b342d5c
MD5 hash: 3386e2abdfb0d9549bfba2cce6ca7689
humanhash: missouri-cat-social-washington
File name:Nw-Inst64.exe
Download: download sample
Signature XWorm
File size:1'909'248 bytes
First seen:2025-03-25 10:15:27 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 49152:TRWp/PzUuHrGdkuxEiRMmWqf2/wzfUMrf5yfdoP+krDDjJOeZs:TEJPzXHrGdkuWJmWZ4CfdoPhXJOk
Threatray 1'696 similar samples on MalwareBazaar
TLSH T1A895334C99F4096AE10DD1FA1DD2DE9DD7A372EB2C6F6B98D09D04B08AE1F40C6E5306
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter BastianHein
Tags:exe xworm

Intelligence


File Origin
# of uploads :
1
# of downloads :
454
Origin country :
CL CL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
Nw-Inst64.exe
Verdict:
Malicious activity
Analysis date:
2025-03-25 10:02:14 UTC
Tags:
evasion stealer dcrat rat xworm remote darkcrystal netreactor susp-powershell wmi-base64

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
infosteal asyncrat phishing
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Creating a window
Searching for the window
Searching for synchronization primitives
Using the Windows Management Instrumentation requests
DNS request
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request
Creating a process with a hidden window
Running batch commands
Reading critical registry keys
Launching a process
Launching the process to change network settings
Loading a suspicious library
Unauthorized injection to a recently created process
Stealing user critical data
Adding an exclusion to Microsoft Defender
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated packed packed packer_detected reconnaissance vbnet
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DCRat, Destiny Stealer, PureLog Stealer,
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Protects its processes via BreakOnTermination flag
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Capture Wi-Fi password
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Yara detected DCRat
Yara detected Destiny Stealer
Yara detected PureLog Stealer
Yara detected StormKitty Stealer
Yara detected XWorm
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1647895 Sample: Nw-Inst64.exe Startdate: 25/03/2025 Architecture: WINDOWS Score: 100 114 ipinfo.io 2->114 116 ip-api.com 2->116 118 3 other IPs or domains 2->118 132 Suricata IDS alerts for network traffic 2->132 134 Found malware configuration 2->134 136 Malicious sample detected (through community Yara rule) 2->136 138 21 other signatures 2->138 12 Nw-Inst64.exe 5 2->12         started        16 svchost.exe 2->16         started        19 RunShell.exe 2->19         started        signatures3 process4 dnsIp5 104 C:\Users\user\AppData\Local\...\XClient.exe, PE32 12->104 dropped 106 C:\Users\user\AppData\...\DCRatBuild.exe, PE32 12->106 dropped 108 C:\Users\user\AppData\Local\Temp\Build.exe, PE32 12->108 dropped 110 C:\Users\user\AppData\...110w-Inst64.exe.log, CSV 12->110 dropped 164 Found many strings related to Crypto-Wallets (likely being stolen) 12->164 21 DCRatBuild.exe 12->21         started        24 XClient.exe 15 6 12->24         started        28 Build.exe 35 50 12->28         started        112 127.0.0.1 unknown unknown 16->112 file6 signatures7 process8 dnsIp9 92 C:\WinnetCommonSvc\fontWinnet.exe, PE32 21->92 dropped 30 wscript.exe 21->30         started        120 ip-api.com 208.95.112.1, 49684, 80 TUT-ASUS United States 24->120 94 C:\Users\user\AppData\Roaming\RunShell.exe, PE32 24->94 dropped 140 Antivirus detection for dropped file 24->140 142 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 24->142 144 Protects its processes via BreakOnTermination flag 24->144 152 5 other signatures 24->152 33 powershell.exe 24->33         started        35 powershell.exe 24->35         started        37 powershell.exe 24->37         started        45 2 other processes 24->45 122 89.39.121.169, 49727, 49883, 49897 NG-ASSosBucuresti-Ploiestinr42-44RO Romania 28->122 124 ipinfo.io 34.117.59.81, 443, 49683 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 28->124 126 get.geojs.io 104.26.1.100, 443, 49688 CLOUDFLARENETUS United States 28->126 146 Multi AV Scanner detection for dropped file 28->146 148 Attempt to bypass Chrome Application-Bound Encryption 28->148 150 Found many strings related to Crypto-Wallets (likely being stolen) 28->150 154 4 other signatures 28->154 39 cmd.exe 28->39         started        41 cmd.exe 28->41         started        43 chrome.exe 28->43         started        file10 signatures11 process12 signatures13 166 Windows Scripting host queries suspicious COM object (likely to drop second stage) 30->166 47 cmd.exe 30->47         started        168 Loading BitLocker PowerShell Module 33->168 49 conhost.exe 33->49         started        51 conhost.exe 35->51         started        53 conhost.exe 37->53         started        170 Uses netsh to modify the Windows network and firewall settings 39->170 172 Tries to harvest and steal WLAN passwords 39->172 55 conhost.exe 39->55         started        60 3 other processes 39->60 62 3 other processes 41->62 57 chrome.exe 43->57         started        64 2 other processes 45->64 process14 dnsIp15 66 fontWinnet.exe 47->66         started        69 conhost.exe 47->69         started        128 www.google.com 142.250.186.132, 443, 49702 GOOGLEUS United States 57->128 process16 file17 84 C:\WinnetCommonSvc\cmd.exe, PE32 66->84 dropped 86 C:\Windows\...\tNW2vONo8sOulFu3jsfcRt.exe, PE32 66->86 dropped 88 C:\Users\user\Desktop\nDFyquCI.log, PE32 66->88 dropped 90 9 other malicious files 66->90 dropped 71 cmd.exe 66->71         started        process18 process19 73 GYPJpFQRBR4kjwpERcAfc.exe 71->73         started        78 conhost.exe 71->78         started        80 chcp.com 71->80         started        82 w32tm.exe 71->82         started        dnsIp20 130 723499cm.shnyash.ru 104.21.17.252, 49698, 49703, 49704 CLOUDFLARENETUS United States 73->130 96 C:\Users\user\Desktop\yOAWXkyM.log, PE32 73->96 dropped 98 C:\Users\user\Desktop\oggGnHtf.log, PE32 73->98 dropped 100 C:\Users\user\Desktop\gCYQEOdx.log, PE32 73->100 dropped 102 3 other malicious files 73->102 dropped 156 Antivirus detection for dropped file 73->156 158 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 73->158 160 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 73->160 162 Tries to harvest and steal browser information (history, passwords, etc) 73->162 file21 signatures22
Threat name:
ByteCode-MSIL.Trojan.XWormRAT
Status:
Malicious
First seen:
2025-03-25 10:02:15 UTC
File Type:
PE (.Net Exe)
Extracted files:
5
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:dcrat family:stormkitty family:xworm collection credential_access discovery infostealer persistence privilege_escalation rat spyware stealer trojan
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies registry class
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Browser Information Discovery
Enumerates physical storage devices
Event Triggered Execution: Netsh Helper DLL
Program crash
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
System Network Configuration Discovery: Wi-Fi Discovery
Drops file in Program Files directory
Drops file in Windows directory
Accesses Microsoft Outlook profiles
Accesses cryptocurrency files/wallets, possible credential harvesting
Looks up external IP address via web service
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Uses browser remote debugging
DcRat
Dcrat family
Detect Xworm Payload
StormKitty
StormKitty payload
Stormkitty family
Xworm
Xworm family
Malware Config
C2 Extraction:
89.39.121.169:9000
Verdict:
Malicious
Tags:
Win.Packed.DCRat-10033661-0 external_ip_lookup
YARA:
n/a
Unpacked files
SH256 hash:
6a4c87064969595078355dae42918fc19c3b71f422d6b5af9cee50a2af2d7b88
MD5 hash:
3386e2abdfb0d9549bfba2cce6ca7689
SHA1 hash:
ed6cb1b6d742f644ea2d1450c84a715d0b342d5c
SH256 hash:
7cd58601d62de54c16bf279d2eb477a0e5b85f62cbe387268c1bec578db2a1e3
MD5 hash:
b8f3934b55afbaa069717cd2e2eda6dd
SHA1 hash:
b33071c576f2637bd679002f01ca68e4df5112ec
Detections:
StormKitty cn_utf8_windows_terminal INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_SUSPICIOUS_EXE_CC_Regex INDICATOR_SUSPICIOUS_EXE_Discord_Regex INDICATOR_SUSPICIOUS_EXE_References_VPN INDICATOR_SUSPICIOUS_EXE_WirelessNetReccon INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs INDICATOR_SUSPICIOUS_Binary_Embedded_MFA_Browser_Extension_IDs MALWARE_Win_StormKitty MALWARE_Win_CyberStealer MALWARE_Win_PhemedroneStealer
SH256 hash:
37330d19e9479d225bf3934cf1b7bb233adc6bf0c8c876f181b814759d7c0b0f
MD5 hash:
31d745f5009eeda2da51b2d05d9711c5
SHA1 hash:
26c27b236bed8cb2046acddcc1c7d7b642b7c610
Detections:
win_xworm_w0 XWorm win_xworm_bytestring win_mal_XWorm INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA MALWARE_Win_AsyncRAT MALWARE_Win_XWorm
SH256 hash:
5153b60b002a0b82848661b6dc00df9e184ef2a3f800aac3e90f2f868b403c46
MD5 hash:
f99323ccbdf71989e975c21ef85ebe10
SHA1 hash:
bd71d9c530579b5944bfdd1a6a3b1b4f52f4eab3
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:win32_dcrat
Author:Reedus0
Description:Rule for detecting DCRat malware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments