MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 9a657f8a9e75786f58aa9775b5b403544fc15249a22bc13165472f4ec7c20b6b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
XWorm
Vendor detections: 20
| SHA256 hash: | 9a657f8a9e75786f58aa9775b5b403544fc15249a22bc13165472f4ec7c20b6b |
|---|---|
| SHA3-384 hash: | daf9c32c3e069dde2b604e7f6420c9d73c8ff1054718ec1ed18c69a7879c2c2dddccc36c6ae40a3051b36ff34e411e06 |
| SHA1 hash: | 0aa29f7d8c4a04f5e9071827fa97decce8d72c20 |
| MD5 hash: | 6ecb301ad38ad9de49026c559e980385 |
| humanhash: | winner-fish-vermont-chicken |
| File name: | Launcher.exe |
| Download: | download sample |
| Signature | XWorm |
| File size: | 2'696'090 bytes |
| First seen: | 2025-09-06 22:31:24 UTC |
| Last seen: | 2025-09-17 14:47:56 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 4d17be67c8d0394c5c1b8e725359ed89 (5 x Adware.Generic, 4 x njrat, 3 x NanoCore) |
| ssdeep | 49152:SjplUf31M1243rtArEjnjHcj1DZTVDVZLvagk8GZDhXjVIm0eGOHV2exMKj6qu+Y:iOf31MRKAvcjZZTJLSf8GXKwHIZvB |
| Threatray | 1'761 similar samples on MalwareBazaar |
| TLSH | T130C5335399120D96C47683356637FB3CEB979EA818C3C77A22E9DD2FF7014029C099E9 |
| TrID | 92.7% (.EXE) NSIS - Nullsoft Scriptable Install System (846567/2/133) 3.4% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 1.1% (.EXE) Win64 Executable (generic) (10522/11/4) 0.7% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 0.5% (.EXE) Win16 NE executable (generic) (5038/12/1) |
| Magika | pebin |
| Reporter | |
| Tags: | cheatskingdom exe fake-cheat LummaStealer xworm |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 197.167.46.25:4242 | https://threatfox.abuse.ch/ioc/1583087/ |
Intelligence
File Origin
GBVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | CP_AllMal_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication |
| Rule name: | FreddyBearDropper |
|---|---|
| Author: | Dwarozh Hoshiar |
| Description: | Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip. |
| Rule name: | shellcode |
|---|---|
| Author: | nex |
| Description: | Matched shellcode byte patterns |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.