MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6bd023fdf28fc9fccccba5b32005e516ed41e7cfeac0f346a9e637219845e591. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XWorm


Vendor detections: 18


Intelligence 18 IOCs 2 YARA 7 File information Comments

SHA256 hash: 6bd023fdf28fc9fccccba5b32005e516ed41e7cfeac0f346a9e637219845e591
SHA3-384 hash: 9f0a59bf3b2d5d8918c428f3095cf06d0c6650611bc9ae25148c7d52ec97f18424af14f3796ba4ba7dcbe07312f07f86
SHA1 hash: ec14b26ade7c2e711a178ecb6375d323fcfb2186
MD5 hash: acf1e62e97b7a33f3c7e1394723392be
humanhash: crazy-sink-bulldog-virginia
File name:TR Proforma Invoice.PDF.bat.exe
Download: download sample
Signature XWorm
File size:1'655'304 bytes
First seen:2025-07-29 15:06:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'653 x AgentTesla, 19'464 x Formbook, 12'205 x SnakeKeylogger)
ssdeep 24576:K+4w/kF+qDEAYKwIAyfpBCjhS2hu6BS8qPH37JUe6yKAICW9O0ElhHqSERv:Qw/kQwGKwCilS2hsPdU/yKTlQ0CqSy
Threatray 16 similar samples on MalwareBazaar
TLSH T12F75122062A4DC07CD9F437818E3F17853B9DE4D6502D32E4ED8ADEFB9797916A021E2
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
dhash icon 0000000000000000 (872 x AgentTesla, 496 x Formbook, 296 x RedLineStealer)
Reporter abuse_ch
Tags:exe xworm


Avatar
abuse_ch
XWorm C2:
45.93.8.241:9352

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
45.93.8.241:9352 https://threatfox.abuse.ch/ioc/1562048/
45.93.8.241:6743 https://threatfox.abuse.ch/ioc/1562054/

Intelligence


File Origin
# of uploads :
1
# of downloads :
41
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
_6bd023fdf28fc9fccccba5b32005e516ed41e7cfeac0f346a9e637219845e591.exe
Verdict:
Malicious activity
Analysis date:
2025-07-29 15:23:32 UTC
Tags:
auto-sch-xml crypto-regex xworm

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
vmdetect asyncrat quasar
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a process with a hidden window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Launching a process
Creating a file
Creating a process from a recently created file
Connection attempt
Sending a custom TCP request
Setting a keyboard event handler
DNS request
Unauthorized injection to a recently created process
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Unauthorized injection to a system process
Result
Threat name:
Quasar, XWorm
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Quasar RAT
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1746409 Sample: TR Proforma Invoice.PDF.bat.exe Startdate: 29/07/2025 Architecture: WINDOWS Score: 100 86 ipwho.is 2->86 106 Suricata IDS alerts for network traffic 2->106 108 Found malware configuration 2->108 110 Malicious sample detected (through community Yara rule) 2->110 112 16 other signatures 2->112 10 TR Proforma Invoice.PDF.bat.exe 7 2->10         started        14 OXTcLyyxinoxZ.exe 2->14         started        16 svchost.exe 1 1 2->16         started        signatures3 process4 dnsIp5 76 C:\Users\user\AppData\...\OXTcLyyxinoxZ.exe, PE32 10->76 dropped 78 C:\...\OXTcLyyxinoxZ.exe:Zone.Identifier, ASCII 10->78 dropped 80 C:\Users\user\AppData\Local\...\tmp6F9E.tmp, XML 10->80 dropped 82 C:\...\TR Proforma Invoice.PDF.bat.exe.log, ASCII 10->82 dropped 118 Writes to foreign memory regions 10->118 120 Allocates memory in foreign processes 10->120 122 Adds a directory exclusion to Windows Defender 10->122 19 MSBuild.exe 5 10->19         started        22 powershell.exe 23 10->22         started        25 powershell.exe 21 10->25         started        27 schtasks.exe 1 10->27         started        124 Multi AV Scanner detection for dropped file 14->124 126 Injects a PE file into a foreign processes 14->126 29 MSBuild.exe 14->29         started        31 schtasks.exe 14->31         started        84 127.0.0.1 unknown unknown 16->84 file6 signatures7 process8 file9 70 C:\Users\user\AppData\Roaming\XClient.exe, PE32 19->70 dropped 72 C:\Users\user\...\RainbowDashClient.exe, PE32 19->72 dropped 74 C:\Users\user\AppData\...\Client-built.exe, PE32 19->74 dropped 33 RainbowDashClient.exe 19->33         started        36 XClient.exe 19->36         started        38 Client-built.exe 14 2 19->38         started        116 Loading BitLocker PowerShell Module 22->116 41 conhost.exe 22->41         started        43 conhost.exe 25->43         started        45 conhost.exe 27->45         started        47 Client-built.exe 29->47         started        51 2 other processes 29->51 49 conhost.exe 31->49         started        signatures10 process11 dnsIp12 92 Antivirus detection for dropped file 33->92 94 Multi AV Scanner detection for dropped file 33->94 96 Bypasses PowerShell execution policy 33->96 53 powershell.exe 33->53         started        56 powershell.exe 33->56         started        98 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 36->98 100 Adds a directory exclusion to Windows Defender 36->100 58 powershell.exe 36->58         started        60 powershell.exe 36->60         started        88 45.93.8.241, 49687, 49696, 49697 VMAGE-ASRU Russian Federation 38->88 90 ipwho.is 15.204.213.5, 443, 49691 HP-INTERNET-ASUS United States 38->90 102 Hides that the sample has been downloaded from the Internet (zone.identifier) 38->102 104 Installs a global keyboard hook 38->104 signatures13 process14 signatures15 114 Loading BitLocker PowerShell Module 53->114 62 conhost.exe 53->62         started        64 conhost.exe 56->64         started        66 conhost.exe 58->66         started        68 conhost.exe 60->68         started        process16
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
.Net Executable PDB Path PE (Portable Executable) SOS: 0.24 Win 32 Exe x86
Threat name:
Win32.Spyware.AsyncRAT
Status:
Malicious
First seen:
2025-07-29 15:07:33 UTC
File Type:
PE (.Net Exe)
Extracted files:
12
AV detection:
17 of 24 (70.83%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:quasar family:xworm botnet:office04 discovery execution persistence rat spyware trojan
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Executes dropped EXE
Command and Scripting Interpreter: PowerShell
Detect Xworm Payload
Quasar RAT
Quasar family
Quasar payload
Xworm
Xworm family
Malware Config
C2 Extraction:
45.93.8.241:9352
45.93.8.241:7895
45.93.8.241:6743
Unpacked files
SH256 hash:
6bd023fdf28fc9fccccba5b32005e516ed41e7cfeac0f346a9e637219845e591
MD5 hash:
acf1e62e97b7a33f3c7e1394723392be
SHA1 hash:
ec14b26ade7c2e711a178ecb6375d323fcfb2186
SH256 hash:
8ec82095a3f5b7b9ce2e58232985ad3961f3b44d3560405d139dcd2e610a5600
MD5 hash:
54aac60be2e5999b29248dc0ab2112ce
SHA1 hash:
7ef6771510e4ef0dbeaff1b159a8c8bb6fbdf6c5
SH256 hash:
4909a3672dd20717f41f9ef6bf68c3ceab7109270c415b021dd53c48b8787a5b
MD5 hash:
33a603e36676a9d4a8ca000d3719404c
SHA1 hash:
d8f9975170f9509a6772f7cbab716d6e54aad808
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
fbdd32034a9d103543d81a6176950d4ef53e9cd75f0603a95efcc3cdb9854ef5
MD5 hash:
0dd40babf5b1f2f8c85f5ab41d95c8f7
SHA1 hash:
f5fc80b6a2466a2daa14351b34621b8f7361fd9a
SH256 hash:
ff47de146ca00ca24c6523b5f163366affb685bd7685dcd03f1506006da0feb4
MD5 hash:
32a936e7780ad9d0a62d20b4b8c9584b
SHA1 hash:
3b03bb14b749e961b7b2eb8cfb9e4c49c0cf2e9c
Detections:
win_xworm_w0 XWorm win_xworm_bytestring win_mal_XWorm INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA MALWARE_Win_AsyncRAT MALWARE_Win_XWorm
SH256 hash:
c5c53bed625f3f703f51bcddb8f3a0db47ae46beead40ff859668a3de4ab083d
MD5 hash:
823afd99d5492ccffc6f7f2d40964a49
SHA1 hash:
280e6b9868509275307812609c5fe370363cd8ff
SH256 hash:
c9736bed57d137a0bd4a454a70436020312db5a365bdd243037e766695c18ccd
MD5 hash:
41b34eab1585d5381c56730b93dd1310
SHA1 hash:
510b640517342dbcc40c81b63db23fa1444a71ed
SH256 hash:
e891c3702edeae8e9eb3950c6bf7779b27b0be239cc769f64404c782ec45f054
MD5 hash:
363d4adc1f141288a796e38843ee1cba
SHA1 hash:
eba242776305aeb448bf1cc02c1ec7eca24ad0d1
Detections:
SUSP_NET_Large_Static_Array_In_Small_File_Jan24 HKTL_NET_GUID_Quasar
Malware family:
QuasarRAT
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_KB_CERT_7c1118cbbadc95da3752c46e47a27438
Author:ditekSHen
Description:Detects executables signed with stolen, revoked or invalid certificates
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high

Comments