MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e0564ad9157ced3ee57be9111a9e6c13eb7d4ff7ecc8ce7724a55ae8428bbcb2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XWorm


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: e0564ad9157ced3ee57be9111a9e6c13eb7d4ff7ecc8ce7724a55ae8428bbcb2
SHA3-384 hash: b8f8334881a2d47f2dd8ba7044566777afb61f43b054271057cf72c8c8913b1891da48b49af4ab69fe664ab2add1ca71
SHA1 hash: 63b2eb7a1acbab72aca842e060bf4b8631f1fa13
MD5 hash: c17fe3978b734ef2b3ece5e318a48ea9
humanhash: november-nitrogen-princess-white
File name:3plpie.ps1
Download: download sample
Signature XWorm
File size:2'733 bytes
First seen:2025-05-09 12:31:49 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 48:1g1AgWPLzA1KfBVLTGzpyZpgXS7g4ddWZuddWZuddWZLMLBeZud/Ko1Kwkk:1g1Ag+LzmWtTGNZXSc4ddrddrddNTdCW
TLSH T17A519712DFC53B4C81F47F630ED4FCF9B30D6A136051B980514289C91249B2C16F91DA
Magika powershell
Reporter JAMESWT_WT
Tags:185-235-128-114 apt Kimsuky ps1 xworm

Intelligence


File Origin
# of uploads :
1
# of downloads :
134
Origin country :
IT IT
Vendor Threat Intelligence
Verdict:
Malicious
Score:
92.5%
Tags:
shell agent sage
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-vm base64 dropper evasive expand fingerprint lolbin obfuscated powershell
Result
Threat name:
n/a
Detection:
malicious
Classification:
expl.evad
Score:
100 / 100
Signature
AI detected malicious Powershell script
Allocates memory in foreign processes
Bypasses PowerShell execution policy
Found pyInstaller with non standard icon
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Powershell drops PE file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1685341 Sample: 3plpie.ps1 Startdate: 09/05/2025 Architecture: WINDOWS Score: 100 111 Malicious sample detected (through community Yara rule) 2->111 113 Multi AV Scanner detection for submitted file 2->113 115 AI detected malicious Powershell script 2->115 117 5 other signatures 2->117 10 powershell.exe 30 2->10         started        14 svchost.exe 2->14         started        process3 dnsIp4 87 C:\Users\user\AppData\...\5xa2w1oj.cmdline, Unicode 10->87 dropped 127 Powershell drops PE file 10->127 17 cmd.exe 1 10->17         started        20 csc.exe 3 10->20         started        23 conhost.exe 10->23         started        97 184.29.183.29 AKAMAI-ASUS United States 14->97 99 127.0.0.1 unknown unknown 14->99 file5 signatures6 process7 file8 107 Bypasses PowerShell execution policy 17->107 25 powershell.exe 18 28 17->25         started        85 C:\Users\user\AppData\Local\...\5xa2w1oj.dll, PE32 20->85 dropped 30 cvtres.exe 1 20->30         started        signatures9 process10 dnsIp11 95 185.235.128.114 ON-LINE-DATAServerlocation-NetherlandsDrontenNL Ukraine 25->95 89 C:\Users\user\AppData\Local\Temp\UnRAR.exe, PE32+ 25->89 dropped 129 Loading BitLocker PowerShell Module 25->129 32 eworvolt.exe 25->32         started        36 eworvolt.exe 25->36         started        38 eworvolt.exe 25->38         started        40 2 other processes 25->40 file12 signatures13 process14 file15 77 20 other files (none is malicious) 32->77 dropped 109 Found pyInstaller with non standard icon 32->109 42 eworvolt.exe 32->42         started        65 C:\Users\user\AppData\...\unicodedata.pyd, PE32 36->65 dropped 67 C:\Users\user\AppData\Local\...\select.pyd, PE32 36->67 dropped 69 C:\Users\user\AppData\Local\...\python39.dll, PE32 36->69 dropped 79 17 other files (none is malicious) 36->79 dropped 45 eworvolt.exe 36->45         started        71 C:\Users\user\AppData\...\unicodedata.pyd, PE32 38->71 dropped 73 C:\Users\user\AppData\Local\...\select.pyd, PE32 38->73 dropped 75 C:\Users\user\AppData\Local\...\python39.dll, PE32 38->75 dropped 81 17 other files (none is malicious) 38->81 dropped 47 eworvolt.exe 38->47         started        49 UnRAR.exe 40->49         started        52 AcroCEF.exe 108 40->52         started        signatures16 process17 dnsIp18 121 Writes to foreign memory regions 42->121 123 Allocates memory in foreign processes 42->123 125 Injects a PE file into a foreign processes 42->125 55 RegSvcs.exe 42->55         started        58 RegSvcs.exe 45->58         started        60 RegSvcs.exe 47->60         started        83 C:\Users\user\AppData\Local\...\eworvolt.exe, PE32 49->83 dropped 91 199.232.214.172 FASTLYUS United States 52->91 93 23.202.57.36 AKAMAI-ASN1EU United States 52->93 62 AcroCEF.exe 5 52->62         started        file19 signatures20 process21 dnsIp22 119 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 55->119 101 162.159.61.3 CLOUDFLARENETUS United States 62->101 103 107.22.247.231 AMAZON-AESUS United States 62->103 105 2 other IPs or domains 62->105 signatures23
Threat name:
Win32.Trojan.Boxter
Status:
Malicious
First seen:
2025-05-09 12:32:11 UTC
File Type:
Text (PowerShell)
AV detection:
7 of 24 (29.17%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xworm discovery execution rat trojan
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Browser Information Discovery
Command and Scripting Interpreter: PowerShell
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
Suspicious use of SetThreadContext
Executes dropped EXE
Loads dropped DLL
Blocklisted process makes network request
Downloads MZ/PE file
Detect Xworm Payload
Xworm
Xworm family
Malware Config
C2 Extraction:
185.235.128.114:7000
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_powershell
Author:daniyyell
Description:Detects suspicious PowerShell activity related to malware execution

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments