MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 aead852238c077c428729516493623060b5a717cf8e52cc690cf1d865f776310. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XWorm


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: aead852238c077c428729516493623060b5a717cf8e52cc690cf1d865f776310
SHA3-384 hash: 73198e007acb67a655a7519280061008007d16441e00770426d6fb01cb2c1b64ab5a9e44e17b6a8100f2b56831edc64b
SHA1 hash: f7e18dc12bd4dd5834876f55f4bea93c83f37634
MD5 hash: c192f06cd94f8368a5baf39e48f794c4
humanhash: violet-march-papa-november
File name:invoice-1645080830.pdf (22).js
Download: download sample
Signature XWorm
File size:68'818 bytes
First seen:2025-12-30 10:11:09 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 768:I8w/h62/jWs6oS+xISN0vGz1uj1epe4ToagJ/dM1v15CsJojxl1ra7Yae3EQAZun:I9l/AoSSMfqusrdkTS6
TLSH T134636C0B3D156E7A33F8893A9A4FC6B08F2DEAF2845CE44DB4A4FC217106D52F157992
Magika txt
Reporter JAMESWT_WT
Tags:js xworm

Intelligence


File Origin
# of uploads :
1
# of downloads :
69
Origin country :
IT IT
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
99.1%
Tags:
xtreme virus overt
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
base64 evasive masquerade obfuscated repaired
Result
Gathering data
Gathering data
Threat name:
Script-JS.Trojan.XWorm
Status:
Malicious
First seen:
2025-12-30 10:04:46 UTC
File Type:
Text (JavaScript)
AV detection:
5 of 36 (13.89%)
Threat level:
  5/5
Gathering data
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments