MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c958794e36f9a23679869d032a90c5471151d5256fc35f86dc7ff87749335a6d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XWorm


Vendor detections: 11


Intelligence 11 IOCs YARA 4 File information Comments

SHA256 hash: c958794e36f9a23679869d032a90c5471151d5256fc35f86dc7ff87749335a6d
SHA3-384 hash: 99ad3e0b692fa95702715411cb5d2f2c93719cc8b1a8bcc0021afce365fb470cc12b852bbd7ad625227ced5400e4748b
SHA1 hash: 7dd0a5f4ea302a6e0502ea74ee71fefd192c423d
MD5 hash: d19b0836e9816f72aac6981497a8ed81
humanhash: yellow-happy-sierra-idaho
File name:Payment_Advice_pdf.tar
Download: download sample
Signature XWorm
File size:202'752 bytes
First seen:2025-11-10 11:57:22 UTC
Last seen:Never
File type: tar
MIME type:application/x-tar
ssdeep 3072:UvGGsNYyvmCY3OiDgEhWOSWMl9yb2o2Da:UeGddH3i9yL2O
TLSH T15D149035F71C768FF69F2462301AAE7F13DC3888452321B875D2A91D5F02D229B9D78A
TrID 62.9% (.TAR/GTAR) TAR - Tape ARchive (GNU) (17/3)
37.0% (.TAR) TAR - Tape ARchive (file) (10/3)
Magika tar
Reporter cocaman
Tags:HSBC payment tar xworm


Avatar
cocaman
Malicious email (T1566.001)
From: "HSBC Advising Service <hildatelo47@zagalov.org>" (likely spoofed)
Received: "from zagalov.org (zagalov.org [104.223.38.104]) "
Date: "7 Nov 2025 01:44:00 -0800"
Subject: "Payment Advice - Advice Ref:[A2gjBpkiPfdy-IN] / Priority payment / Customer Ref: [83427657]"
Attachment: "Payment_Advice_pdf.tar"

Intelligence


File Origin
# of uploads :
1
# of downloads :
83
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:Payment_Advice_pdf.bat
File size:201'070 bytes
SHA256 hash: 4e6d500ed54ad0ae55137aed25539c0939c541c72677239536448657bd201321
MD5 hash: ec466439da8098e88d7bfc523cac0d3f
MIME type:text/plain
Signature XWorm
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.1%
Tags:
xtreme shell virus
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
base64 evasive masquerade obfuscated powershell
Verdict:
Malicious
File Type:
tar
First seen:
2025-11-08T04:35:00Z UTC
Last seen:
2025-11-08T04:50:00Z UTC
Hits:
~10
Verdict:
Malware
YARA:
3 match(es)
Tags:
DeObfuscated PowerShell Tar Archive
Threat name:
Script-BAT.Backdoor.XWorm
Status:
Malicious
First seen:
2025-11-07 13:05:21 UTC
File Type:
Binary (Archive)
Extracted files:
1
AV detection:
12 of 24 (50.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xworm execution rat trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: PowerShell
Drops startup file
Badlisted process makes network request
Detect Xworm Payload
Xworm
Xworm family
Malware Config
C2 Extraction:
23.95.117.247:701
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:SUSP_PS1_JAB_Pattern_Jun22_1
Author:Florian Roth (Nextron Systems)
Description:Detects suspicious UTF16 and Base64 encoded PowerShell code that starts with a $ sign and a single char variable
Reference:Internal Research
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

XWorm

tar c958794e36f9a23679869d032a90c5471151d5256fc35f86dc7ff87749335a6d

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments