MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8d950928f9492e19a346689b43c077047d1ca80211714ab9adebd300f8bd1c11. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XWorm


Vendor detections: 12


Intelligence 12 IOCs YARA 1 File information Comments

SHA256 hash: 8d950928f9492e19a346689b43c077047d1ca80211714ab9adebd300f8bd1c11
SHA3-384 hash: 08a632e72637d65f0879bff25c35722c59e67f77d6bb87eae9ad2cc0ec8e6c085c06f20233fb505f21f6030a509336e7
SHA1 hash: 1412dfd46eeefdd255c879b1d68a3b5e53367028
MD5 hash: 9af39c7367e3bbfce7f72eaee5e976ab
humanhash: sad-undress-hamper-texas
File name:01 - 05 FEB 2026 KLRI 6128-ACE TRAVEL.vbs
Download: download sample
Signature XWorm
File size:1'161'100 bytes
First seen:2026-01-27 14:36:21 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 384:2DN3EaRrBxwjBe3ZB6skUgw3Pk8LEor3Eac+Qa3ZPe1/XSw3PKwz5OJvBe33Btch:axM5X8
Threatray 1'522 similar samples on MalwareBazaar
TLSH T1783512E53957F50A0EAA51E3DA20BC562BDB822345751CDC0CA4F75E88F9AEE4ED3C01
Magika unknown
Reporter James_inthe_box
Tags:exe vbs xworm

Intelligence


File Origin
# of uploads :
1
# of downloads :
128
Origin country :
US US
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
95.7%
Tags:
obfuscate xtreme virus
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm base64 base64 fingerprint obfuscated obfuscated overlay powershell
Verdict:
Malicious
File Type:
vbs
First seen:
2026-01-27T08:43:00Z UTC
Last seen:
2026-01-29T07:21:00Z UTC
Hits:
~1000
Detections:
UDS:DangerousObject.Multi.Generic Trojan.Win32.Zapchast.bhgd Trojan.JS.SAgent.sb HEUR:Trojan.Win32.Agentb.gen HEUR:Trojan.Script.Generic
Gathering data
Threat name:
Script-WScript.Trojan.Generic
Status:
Suspicious
First seen:
2026-01-27 11:57:20 UTC
File Type:
Binary
AV detection:
6 of 37 (16.22%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:phantom_stealer family:xworm collection defense_evasion discovery execution persistence rat spyware stealer trojan
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
outlook_office_path
outlook_win_path
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Time Discovery
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Checks computer location settings
Drops startup file
Executes dropped EXE
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
System Binary Proxy Execution: Regsvcs/Regasm
Detect Xworm Payload
Detects PhantomStealer payload
PhantomStealer
Phantom_stealer family
Process spawned unexpected child process
Xworm
Xworm family
Malware Config
C2 Extraction:
158.94.210.127:6991
Dropper Extraction:
https://res.cloudinary.com/dxxyxpqxg/image/upload/v1769187753/optimized_MSI_nthgyz.jpg
Malware family:
DnlibLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ClamAV_Emotet_String_Aggregate

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments