MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a737473266d7e99964c7690b52eecf1a57c2df38a882c85e7c6ff114a5cd4735. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XWorm


Vendor detections: 18


Intelligence 18 IOCs YARA 2 File information Comments

SHA256 hash: a737473266d7e99964c7690b52eecf1a57c2df38a882c85e7c6ff114a5cd4735
SHA3-384 hash: fdd65873bb505fddf902d73e7e68cfe5e3ec5997fe6c275857261d198c091f15ab1409af239748c3b558e9f5fb90bfcf
SHA1 hash: e9d54a77baebff545784dcaf1272ad2ce7d22d58
MD5 hash: 93f162caa8c90a78c55684f652dd41f4
humanhash: ceiling-oscar-solar-vermont
File name:XBinderOutput.exe
Download: download sample
Signature XWorm
File size:778'240 bytes
First seen:2025-02-27 21:19:06 UTC
Last seen:2025-02-27 22:48:04 UTC
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 12288:/m1JPhj0l6Io66kLtk3LwR6gPH6uupF9XzME0Pc2qvXuuNR1znBtVPLh:/m19hI0ItwgPHyUqvXrv99PLh
TLSH T10FF4235146838E93CDAF37FA9831F64A03129B574D5BDA4F8424B73571D60B8AC2B3A3
TrID 50.8% (.EXE) Win64 Executable (generic) (10522/11/4)
10.0% (.EXE) Win16/32 Executable Delphi generic (2072/23)
9.9% (.ICL) Windows Icons Library (generic) (2059/9)
9.8% (.EXE) OS/2 Executable (generic) (2029/13)
9.6% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter BastianHein
Tags:exe xworm

Intelligence


File Origin
# of uploads :
2
# of downloads :
494
Origin country :
CL CL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
XBinderOutput.exe
Verdict:
Malicious activity
Analysis date:
2025-02-27 21:05:03 UTC
Tags:
evasion telegram xworm remote ims-api generic

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
asyncrat autorun
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Using the Windows Management Instrumentation requests
Launching a process
DNS request
Connection attempt
Creating a window
Searching for synchronization primitives
Sending an HTTP GET request
Sending a custom TCP request
Creating a process with a hidden window
Changing a file
Unauthorized injection to a recently created process
Adding an exclusion to Microsoft Defender
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated obfuscated packed packed packer_detected vbnet
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Python Stealer, Luna Grabber, Luna Logge
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Found malware configuration
Found suspicious ZIP file
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Generic Python Stealer
Yara detected Luna Grabber
Yara detected Luna Logger
Yara detected Telegram RAT
Yara detected Telegram Recon
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1626055 Sample: XBinderOutput.exe Startdate: 27/02/2025 Architecture: WINDOWS Score: 100 103 ip-api.com 2->103 105 g-bing-com.ax-0001.ax-msedge.net 2->105 107 ax-0001.ax-msedge.net 2->107 127 Found malware configuration 2->127 129 Malicious sample detected (through community Yara rule) 2->129 131 Antivirus detection for URL or domain 2->131 133 18 other signatures 2->133 11 XBinderOutput.exe 8 2->11         started        signatures3 process4 file5 93 C:\Users\user\AppData\Local\Temp\Lunar.exe, PE32 11->93 dropped 95 C:\Users\user\AppData\Local\...\Builder.exe, PE32 11->95 dropped 97 C:\Users\user\...\XBinderOutput.exe.log, ASCII 11->97 dropped 145 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 11->145 15 Builder.exe 3 11->15         started        19 Lunar.exe 14 3 11->19         started        signatures6 process7 dnsIp8 99 C:\Users\user\AppData\Local\...\XClient.exe, PE32 15->99 dropped 101 C:\Users\user\AppData\Local\...\Builder2.exe, PE32 15->101 dropped 111 Antivirus detection for dropped file 15->111 113 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 15->113 22 Builder2.exe 4 3 15->22         started        26 XClient.exe 14 3 15->26         started        109 ip-api.com 208.95.112.1, 49733, 49734, 49735 TUT-ASUS United States 19->109 115 Bypasses PowerShell execution policy 19->115 117 Adds a directory exclusion to Windows Defender 19->117 28 powershell.exe 19->28         started        30 powershell.exe 19->30         started        32 powershell.exe 19->32         started        file9 signatures10 process11 file12 83 C:\Users\user\AppData\Local\Temp\Lol.exe, PE32 22->83 dropped 139 Antivirus detection for dropped file 22->139 34 Lol.exe 14 3 22->34         started        37 unarchiver.exe 22->37         started        141 Adds a directory exclusion to Windows Defender 26->141 39 powershell.exe 26->39         started        41 powershell.exe 26->41         started        43 powershell.exe 26->43         started        143 Loading BitLocker PowerShell Module 28->143 45 conhost.exe 28->45         started        47 conhost.exe 30->47         started        49 conhost.exe 32->49         started        signatures13 process14 signatures15 119 Antivirus detection for dropped file 34->119 121 Multi AV Scanner detection for dropped file 34->121 123 Adds a directory exclusion to Windows Defender 34->123 51 powershell.exe 34->51         started        54 powershell.exe 34->54         started        56 powershell.exe 34->56         started        58 7za.exe 37->58         started        61 cmd.exe 37->61         started        125 Loading BitLocker PowerShell Module 39->125 63 conhost.exe 39->63         started        65 conhost.exe 41->65         started        67 conhost.exe 43->67         started        process16 file17 135 Loading BitLocker PowerShell Module 51->135 69 conhost.exe 51->69         started        71 conhost.exe 54->71         started        73 conhost.exe 56->73         started        85 C:\Users\user\AppData\Local\Temp\...\upx.exe, PE32+ 58->85 dropped 87 C:\Users\user\AppData\Local\Temp\...\upx.py, Python 58->87 dropped 89 C:\Users\user\AppData\Local\...\update.py, Python 58->89 dropped 91 3 other malicious files 58->91 dropped 75 conhost.exe 58->75         started        137 Maps a DLL or memory area into another process 61->137 77 conhost.exe 61->77         started        79 AppInstallerPythonRedirector.exe 61->79         started        81 AppInstallerPythonRedirector.exe 61->81         started        signatures18 process19
Threat name:
ByteCode-MSIL.Trojan.XWormRAT
Status:
Malicious
First seen:
2025-02-27 21:05:03 UTC
File Type:
PE+ (.Net Exe)
Extracted files:
3
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:xworm discovery rat trojan
Behaviour
Modifies registry class
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Looks up external IP address via web service
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Detect Xworm Payload
Xworm
Xworm family
Malware Config
C2 Extraction:
navigation-salaries.gl.at.ply.gg:31894
associates-reef.gl.at.ply.gg:31555
visit-judges.gl.at.ply.gg:22216
Verdict:
Malicious
Tags:
external_ip_lookup
YARA:
n/a
Unpacked files
SH256 hash:
a737473266d7e99964c7690b52eecf1a57c2df38a882c85e7c6ff114a5cd4735
MD5 hash:
93f162caa8c90a78c55684f652dd41f4
SHA1 hash:
e9d54a77baebff545784dcaf1272ad2ce7d22d58
SH256 hash:
1b04a6d673ed23936cdc1f362261ecea6d6c85a9ffe60cdf4c1497ef7a9e97d2
MD5 hash:
ec4d30902b8e654617d550cbf0680e92
SHA1 hash:
5c36e2444bbdadf19205970267d37072bc24d5bc
Detections:
win_xworm_w0 XWorm win_xworm_bytestring win_xworm_simple_strings win_mal_XWorm INDICATOR_SUSPICIOUS_EXE_TelegramChatBot INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA MALWARE_Win_AsyncRAT MALWARE_Win_XWorm
SH256 hash:
60cc77b5d4210cef0a9032908b179142f212155426fdae48055c5f72811f7a12
MD5 hash:
26abb9e459e5976f658ce80d6433f1b1
SHA1 hash:
3c8f02c1cf7b8ae82be3deea4b360497f6fee1c3
SH256 hash:
7ef1559f64c1bf9595184f8d8f96117aefe7c9493ca1c62c0024b46db9bc5315
MD5 hash:
4a7a991b4b48807f80c9c39ad961c18b
SHA1 hash:
7234a76324ba2eabe7cb9b692f86502c78203d33
Detections:
win_xworm_w0 XWorm win_xworm_bytestring win_xworm_simple_strings win_mal_XWorm INDICATOR_SUSPICIOUS_EXE_TelegramChatBot INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA MALWARE_Win_AsyncRAT MALWARE_Win_XWorm
SH256 hash:
b5ac2fccf3e0efddf9366cbedf65d0c9d7becfade5a10ecab014d7e3b08b3b6f
MD5 hash:
f1306df97f21e508d50995c8a8841b3b
SHA1 hash:
2c0705bf163919e72befb427f58af4ad2775d2c1
Detections:
win_xworm_w0 XWorm win_xworm_bytestring win_xworm_simple_strings win_mal_XWorm INDICATOR_SUSPICIOUS_EXE_TelegramChatBot INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA MALWARE_Win_AsyncRAT MALWARE_Win_XWorm
SH256 hash:
14bedde382dd95f3538e9ff45c622910125e07f47ce8de13b6d83d495bb24d39
MD5 hash:
a99615d87f1fc0d7a3bf25b0bd4b7e36
SHA1 hash:
4d0546250ca3cb7808acf95577a66ece16518507
Detections:
win_xworm_w0 XWorm win_xworm_bytestring win_xworm_simple_strings win_mal_XWorm INDICATOR_SUSPICIOUS_EXE_TelegramChatBot INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA MALWARE_Win_AsyncRAT MALWARE_Win_XWorm
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments