MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 927a9f72eb0fb2e6e4189884e319ce4bbb99152c2b1c7670f3b5429be437714c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XWorm


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 927a9f72eb0fb2e6e4189884e319ce4bbb99152c2b1c7670f3b5429be437714c
SHA3-384 hash: e149ea21a0d6a1acdc3ed53b32d65e6a3040a69367a1ef6f56096056751f991176f6a10749230927aeffb4075c5ef2b2
SHA1 hash: ae19586b4df19348ecdbe68e491b22d0090e3043
MD5 hash: 8fd375e346650dcec40822075e426ffa
humanhash: quebec-november-colorado-kilo
File name:z20bl_confirm_a.vbs
Download: download sample
Signature XWorm
File size:105'108 bytes
First seen:2025-05-14 02:00:07 UTC
Last seen:2025-05-14 05:59:33 UTC
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 1536:bouDzBshrkbmEKFfM9xb2rXkF5yA1qWT6PnDaqFdGk2GVkZOVoi+L8CAs8kOZpOn:EqnX2rXkvLdiDaqdRY0iL0fOsEzvWO
Threatray 1'766 similar samples on MalwareBazaar
TLSH T1A4A3A539C7A4CDDDC32B70D27A1C7A4222195BEBEE551FBDA0864CFA09A104E57FE409
Magika vba
Reporter FXOLabs
Tags:vbs xworm

Intelligence


File Origin
# of uploads :
2
# of downloads :
160
Origin country :
BR BR
Vendor Threat Intelligence
Verdict:
Malicious
Score:
92.5%
Tags:
obfuscate xtreme shell
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
base64 evasive obfuscated powershell
Result
Threat name:
Batch Injector, XWorm
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Found malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample uses string decryption to hide its real strings
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: PowerShell Base64 Encoded Invoke Keyword
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Uses dynamic DNS services
VBScript performs obfuscated calls to suspicious functions
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Yara detected Batch Injector
Yara detected Powershell decode and execute
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1689526 Sample: z20bl_confirm_a.vbs Startdate: 14/05/2025 Architecture: WINDOWS Score: 100 29 botangroup.duckdns.org 2->29 31 pki-goog.l.google.com 2->31 33 c.pki.goog 2->33 41 Found malware configuration 2->41 43 Malicious sample detected (through community Yara rule) 2->43 45 Antivirus detection for URL or domain 2->45 49 15 other signatures 2->49 9 wscript.exe 2 2->9         started        signatures3 47 Uses dynamic DNS services 29->47 process4 file5 27 C:\Users\user\AppData\Local\...\JsZPlGlL.bat, ASCII 9->27 dropped 53 VBScript performs obfuscated calls to suspicious functions 9->53 55 Wscript starts Powershell (via cmd or directly) 9->55 57 Windows Scripting host queries suspicious COM object (likely to drop second stage) 9->57 59 Suspicious execution chain found 9->59 13 cmd.exe 1 9->13         started        signatures6 process7 signatures8 61 Suspicious powershell command line found 13->61 63 Wscript starts Powershell (via cmd or directly) 13->63 65 Bypasses PowerShell execution policy 13->65 16 cmd.exe 2 13->16         started        19 conhost.exe 13->19         started        process9 signatures10 37 Suspicious powershell command line found 16->37 39 Wscript starts Powershell (via cmd or directly) 16->39 21 powershell.exe 16 16->21         started        25 conhost.exe 16->25         started        process11 dnsIp12 35 botangroup.duckdns.org 172.111.131.164, 3911, 49692, 49695 ASDETUKhttpwwwheficedcomGB United States 21->35 51 Found suspicious powershell code related to unpacking or dynamic code loading 21->51 signatures13
Threat name:
Script-WScript.Backdoor.Xworm
Status:
Suspicious
First seen:
2025-05-14 01:01:44 UTC
File Type:
Text (VBS)
AV detection:
11 of 37 (29.73%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xworm execution rat trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Command and Scripting Interpreter: PowerShell
Checks computer location settings
Blocklisted process makes network request
Detect Xworm Payload
Xworm
Xworm family
Malware Config
C2 Extraction:
botangroup.duckdns.org:3911
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

XWorm

Visual Basic Script (vbs) vbs 927a9f72eb0fb2e6e4189884e319ce4bbb99152c2b1c7670f3b5429be437714c

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments