MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 74aec50229796de396a7c52d9db2b554ef3b943b248b637baba58ad0a8c7b41c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XWorm


Vendor detections: 12


Intelligence 12 IOCs YARA 6 File information Comments

SHA256 hash: 74aec50229796de396a7c52d9db2b554ef3b943b248b637baba58ad0a8c7b41c
SHA3-384 hash: 3ac108718f2d67442a6b4aeb9065b93a2335c0cd3b30235636cca1f5f409314afc3a4d58c170a92a59e897c398f74902
SHA1 hash: 70e2473b6a70e4f0835fe2def06779d0976ecc01
MD5 hash: 94cdb83fe2a0a45a5ef508a6a814ad3f
humanhash: seventeen-blossom-social-moon
File name:Scanned-Doc-t00778886867-QUO.LNK
Download: download sample
Signature XWorm
File size:202'561 bytes
First seen:2025-04-18 04:47:58 UTC
Last seen:Never
File type:Shortcut (lnk) lnk
MIME type:application/x-ms-shortcut
ssdeep 3072:kx+dbszJ2vCtmskYT3rKL1eyoPQWi+PBGyZL9uTEdOolnK3HbQwA:icbRvTngO1o7i+PQ+L91J1KXbtA
Threatray 1 similar samples on MalwareBazaar
TLSH T18B14F191CB761FC9FF3949BC09AE2F464C8D6E323C13C4BAC99B250B422469559F2D1B
Magika lnk
Reporter abuse_ch
Tags:lnk xworm

Intelligence


File Origin
# of uploads :
1
# of downloads :
103
Origin country :
NL NL
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.9%
Tags:
autorun delphi emotet
Result
Verdict:
Malicious
File Type:
LNK File - Malicious
Payload URLs
URL
File name
https://bdnews25.com/wp-includes/assets/converted.txt','C:\\ProgramData\\HEW.GIF');
LNK File
Behaviour
BlacklistAPI detected
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive masquerade powershell
Result
Verdict:
MALICIOUS
Result
Threat name:
DBatLoader, PureLog Stealer, XWorm
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Allocates many large memory junks
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops or copies cmd.exe with a different name (likely to bypass HIPS)
Drops PE files to the user root directory
Drops PE files with a suspicious file extension
Encrypted powershell cmdline option found
Found malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Powershell drops PE file
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: DLL Search Order Hijackig Via Additional Space in Path
Sigma detected: Execution from Suspicious Folder
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: PowerShell DownloadFile
Sigma detected: Suspicious PowerShell Download and Execute Pattern
Suspicious powershell command line found
Tries to download and execute files (via powershell)
Uses dynamic DNS services
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses schtasks.exe or at.exe to add and modify task schedules
Windows shortcut file (LNK) contains suspicious command line arguments
Windows shortcut file (LNK) starts blacklisted processes
Writes to foreign memory regions
Yara detected DBatLoader
Yara detected Powershell download and execute
Yara detected PureLog Stealer
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1668133 Sample: Scanned-Doc-t00778886867-QU... Startdate: 18/04/2025 Architecture: WINDOWS Score: 100 79 xwormuncreated.duckdns.org 2->79 81 bdnews25.com 2->81 87 Found malware configuration 2->87 89 Malicious sample detected (through community Yara rule) 2->89 91 Windows shortcut file (LNK) starts blacklisted processes 2->91 95 21 other signatures 2->95 9 powershell.exe 14 22 2->9         started        14 rundll32.exe 3 2->14         started        16 rundll32.exe 2->16         started        18 3 other processes 2->18 signatures3 93 Uses dynamic DNS services 79->93 process4 dnsIp5 83 bdnews25.com 204.197.172.18, 443, 49681 WEBNETUS Reserved 9->83 77 C:\ProgramData\CHROME.PIF, PE32 9->77 dropped 129 Drops PE files with a suspicious file extension 9->129 131 Found suspicious powershell code related to unpacking or dynamic code loading 9->131 133 Powershell drops PE file 9->133 20 CHROME.PIF 9 9->20         started        24 conhost.exe 1 9->24         started        26 WMIADAP.exe 9->26         started        28 Bjxuvdbh.PIF 14->28         started        30 Bjxuvdbh.PIF 16->30         started        85 127.0.0.1 unknown unknown 18->85 32 Bjxuvdbh.PIF 18->32         started        34 Bjxuvdbh.PIF 18->34         started        file6 signatures7 process8 file9 71 C:\Users\user\Links\hbdvuxjB.pif, PE32 20->71 dropped 73 C:\Users\user\Links\Bjxuvdbh.PIF, PE32 20->73 dropped 109 Windows shortcut file (LNK) starts blacklisted processes 20->109 111 Drops PE files with a suspicious file extension 20->111 113 Writes to foreign memory regions 20->113 115 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 20->115 36 cmd.exe 1 20->36         started        39 hbdvuxjB.pif 2 20->39         started        41 cmd.exe 1 20->41         started        43 cmd.exe 1 20->43         started        117 Allocates memory in foreign processes 28->117 119 Sample uses process hollowing technique 28->119 121 Allocates many large memory junks 28->121 45 hbdvuxjB.pif 28->45         started        47 hbdvuxjB.pif 30->47         started        49 hbdvuxjB.pif 32->49         started        51 hbdvuxjB.pif 34->51         started        signatures10 process11 signatures12 97 Uses ping.exe to sleep 36->97 99 Uses schtasks.exe or at.exe to add and modify task schedules 36->99 101 Uses ping.exe to check the status of other devices and networks 36->101 53 esentutl.exe 2 36->53         started        57 conhost.exe 36->57         started        59 alpha.pif 2 36->59         started        61 alpha.pif 2 36->61         started        103 Detected unpacking (changes PE section rights) 39->103 105 Detected unpacking (overwrites its own PE header) 39->105 107 Installs a global keyboard hook 39->107 63 conhost.exe 41->63         started        65 PING.EXE 1 41->65         started        67 conhost.exe 43->67         started        69 schtasks.exe 1 43->69         started        process13 file14 75 C:\Users\Public\alpha.pif, PE32 53->75 dropped 123 Drops PE files to the user root directory 53->123 125 Drops PE files with a suspicious file extension 53->125 127 Drops or copies cmd.exe with a different name (likely to bypass HIPS) 53->127 signatures15
Threat name:
Win32.Trojan.Powdowhlnk
Status:
Malicious
First seen:
2025-04-18 04:48:28 UTC
File Type:
Binary
Extracted files:
1
AV detection:
15 of 38 (39.47%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
dbatloader asyncrat
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:modiloader family:xworm discovery execution rat trojan
Behaviour
Runs ping.exe
Scheduled Task/Job: Scheduled Task
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Executes dropped EXE
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
ModiLoader Second Stage
Detect Xworm Payload
ModiLoader, DBatLoader
Modiloader family
Xworm
Xworm family
Malware Config
C2 Extraction:
xwormdnslogs.ddns.net:3360
xwormnewlog.duckdns.org:3360
xwormnotcreated.duckdns.org:3360
xwormuncreated.duckdns.org:3360
Dropper Extraction:
https://bdnews25.com/wp-includes/assets/converted.txt
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Download_in_LNK
Author:@bartblaze
Description:Identifies download artefacts in shortcut (LNK) files.
Rule name:Large_filesize_LNK
Author:@bartblaze
Description:Identifies shortcut (LNK) file larger than 100KB. Most goodware LNK files are smaller than 100KB.
Rule name:PS_in_LNK
Author:@bartblaze
Description:Identifies PowerShell artefacts in shortcut (LNK) files.
Rule name:SUSP_LNK_SuspiciousCommands
Author:Florian Roth (Nextron Systems)
Description:Detects LNK file with suspicious content
Rule name:Warp
Author:Seth Hardy
Description:Warp
Rule name:WarpStrings
Author:Seth Hardy
Description:Warp Identifying Strings

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments