MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dfdcb766fdbf5c8be70594c09b75907bca9a35c61f1245721f82a8fc07f5b424. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XWorm


Vendor detections: 13


Intelligence 13 IOCs YARA 3 File information Comments

SHA256 hash: dfdcb766fdbf5c8be70594c09b75907bca9a35c61f1245721f82a8fc07f5b424
SHA3-384 hash: dbc2407fc3a12cf5634fa7537da7b65b4e96c779fa5a2f799481f7edb940f651ad810143b738a2256b5f19caebdfded0
SHA1 hash: c7db07f00f91483c9360a32371bbb8b1681ed2de
MD5 hash: cabee3b3963cae4f1a8344167a35397c
humanhash: five-princess-network-papa
File name:fed1744007643.exe
Download: download sample
Signature XWorm
File size:440'832 bytes
First seen:2023-07-25 13:46:34 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'608 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 3072:q+S7JbeW4Gc8yJYFuVWnory7z3KNldg2qCpQAFObra8/JHCCxHkyxQIF3hqj4pqA:q+2bp4UFu7NNAE3uI0
Threatray 132 similar samples on MalwareBazaar
TLSH T14F9485B1362254C9C18A1DB8CEB7366133A739BCF885364CE89B772F5653265241EB0F
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon f0cc86a38a86e0f0 (1 x LgoogLoader, 1 x XWorm)
Reporter Anonymous
Tags:exe xworm

Intelligence


File Origin
# of uploads :
1
# of downloads :
356
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
fed1744007643.exe
Verdict:
Malicious activity
Analysis date:
2023-07-25 13:49:29 UTC
Tags:
xworm remote

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Sending a custom TCP request
Launching a process
Running batch commands
Сreating synchronization primitives
Creating a file in the %AppData% subdirectories
Creating a file
Creating a window
DNS request
Using the Windows Management Instrumentation requests
Creating a process from a recently created file
Setting a global event handler for the keyboard
Unauthorized injection to a system process
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
cmd lolbin obfuscated packed packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes (.Net Source)
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1279194 Sample: fed1744007643.exe Startdate: 25/07/2023 Architecture: WINDOWS Score: 100 62 Snort IDS alert for network traffic 2->62 64 Found malware configuration 2->64 66 Malicious sample detected (through community Yara rule) 2->66 68 8 other signatures 2->68 7 fed1744007643.exe 2 2->7         started        11 fed1744007643.exe 2->11         started        13 fed1744007643.exe 2->13         started        process3 file4 54 C:\Users\user\...\fed1744007643.exe.log, CSV 7->54 dropped 72 Writes to foreign memory regions 7->72 74 Allocates memory in foreign processes 7->74 76 Injects a PE file into a foreign processes 7->76 15 cmd.exe 3 7->15         started        18 cmd.exe 2 7->18         started        21 RegAsm.exe 2 7->21         started        24 cmd.exe 1 7->24         started        78 Multi AV Scanner detection for dropped file 11->78 80 Machine Learning detection for dropped file 11->80 26 cmd.exe 11->26         started        28 cmd.exe 1 11->28         started        32 2 other processes 11->32 30 cmd.exe 13->30         started        34 3 other processes 13->34 signatures5 process6 dnsIp7 56 C:\Users\user\AppData\...\fed1744007643.exe, PE32 15->56 dropped 58 C:\...\fed1744007643.exe:Zone.Identifier, ASCII 15->58 dropped 36 conhost.exe 15->36         started        70 Uses schtasks.exe or at.exe to add and modify task schedules 18->70 38 conhost.exe 18->38         started        60 newxworm.duckdns.org 87.120.88.94, 49705, 7000 NET1-ASBG Bulgaria 21->60 40 conhost.exe 24->40         started        42 schtasks.exe 1 24->42         started        48 2 other processes 26->48 44 conhost.exe 28->44         started        50 2 other processes 30->50 46 conhost.exe 32->46         started        52 2 other processes 34->52 file8 signatures9 process10
Threat name:
Win32.Ransomware.Loki
Status:
Malicious
First seen:
2023-07-25 13:47:05 UTC
File Type:
PE (.Net Exe)
Extracted files:
17
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xworm rat trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Executes dropped EXE
Xworm
Malware Config
C2 Extraction:
newxworm.duckdns.org:7000
Unpacked files
SH256 hash:
5eada5d4cbba3ac7547f4eb22c8d478b517356d7a48d90c416b4be5a2657cb2f
MD5 hash:
a44c37a64860e263e493056f641e4836
SHA1 hash:
ec5fc0bfddcb0e2d4fa2a28d90301e7899c73803
Detections:
SH256 hash:
dfdcb766fdbf5c8be70594c09b75907bca9a35c61f1245721f82a8fc07f5b424
MD5 hash:
cabee3b3963cae4f1a8344167a35397c
SHA1 hash:
c7db07f00f91483c9360a32371bbb8b1681ed2de
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_SmartAssembly
Author:ditekSHen
Description:Detects executables packed with SmartAssembly
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments