MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e11d5fa18b5e000654afdd60c67df0cfc0ae4146ac1068f06b20e2b59be715e3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XWorm


Vendor detections: 18


Intelligence 18 IOCs YARA 25 File information Comments

SHA256 hash: e11d5fa18b5e000654afdd60c67df0cfc0ae4146ac1068f06b20e2b59be715e3
SHA3-384 hash: 95c005e854a62a553e39de997c4a61efbc5728cb9e5eb79b0aeadd79bce5e3bb382f3102ce291b7dbd8cc927d69bd214
SHA1 hash: 8058d6219f0cf70e8450a826bf971fcf6b7b3ed8
MD5 hash: abb3a1f9959d2cad6e28c5f4828c89f7
humanhash: speaker-seven-fourteen-music
File name:svchost.exe
Download: download sample
Signature XWorm
File size:513'536 bytes
First seen:2025-03-13 17:16:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'845 x AgentTesla, 19'775 x Formbook, 12'298 x SnakeKeylogger)
ssdeep 12288:yu3DTkV1ilKya0FOUuQ0gH+kmtbF6W05EJXp107sd:hkGTy
Threatray 1'399 similar samples on MalwareBazaar
TLSH T1B0B4E9242DFB501DB3B3EFA55FD8B8EF896EF673260A60B9205103464722D81DD92739
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter 2huMarisa
Tags:exe trojan xworm

Intelligence


File Origin
# of uploads :
1
# of downloads :
454
Origin country :
CA CA
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
svchost.exe
Verdict:
Malicious activity
Analysis date:
2025-03-13 17:22:30 UTC
Tags:
pastebin xworm remote amsi-bypass autorun-startup autorun-reg

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
asyncrat autorun cobalt
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Launching a process
Creating a process with a hidden window
DNS request
Connection attempt
Sending a custom TCP request
Creating a window
Creating a file in the Windows subdirectories
Creating a file in the system32 subdirectories
Forced system process termination
Setting browser functions hooks
Possible injection to a system process
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun by creating a file
Using obfuscated Powershell scripts
Unauthorized injection to a system process
Unauthorized injection to a browser process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context crypto cryptor_detected obfuscated packed packed packed reconnaissance
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains process injector
.NET source code references suspicious native API functions
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Drops PE files to the user root directory
Found malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs new ROOT certificates
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Execution from Suspicious Folder
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential WinAPI Calls Via CommandLine
Sigma detected: System File Execution Location Anomaly
Suricata IDS alerts for network traffic
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1637592 Sample: svchost.exe Startdate: 13/03/2025 Architecture: WINDOWS Score: 100 56 pastebin.com 2->56 76 Suricata IDS alerts for network traffic 2->76 78 Found malware configuration 2->78 80 Malicious sample detected (through community Yara rule) 2->80 84 22 other signatures 2->84 9 powershell.exe 2 15 2->9         started        12 svchost.exe 4 2->12         started        15 DeadM.exe 2->15         started        17 DeadM.exe 2->17         started        signatures3 82 Connects to a pastebin service (likely for C&C) 56->82 process4 file5 106 Writes to foreign memory regions 9->106 108 Modifies the context of a thread in another process (thread injection) 9->108 110 Found suspicious powershell code related to unpacking or dynamic code loading 9->110 112 Injects a PE file into a foreign processes 9->112 19 dllhost.exe 1 9->19         started        22 conhost.exe 9->22         started        50 C:\Users\user\AppData\Local\Temp\DeadR.exe, PE32 12->50 dropped 52 C:\Users\user\AppData\Local\...\DeadMxtr.exe, PE32 12->52 dropped 54 C:\Users\user\AppData\...\svchost.exe.log, CSV 12->54 dropped 24 DeadMxtr.exe 1 12->24         started        26 DeadMxtr.exe 15 5 12->26         started        30 DeadR.exe 1 12->30         started        32 DeadR.exe 12->32         started        114 Antivirus detection for dropped file 15->114 signatures6 process7 dnsIp8 86 Injects code into the Windows Explorer (explorer.exe) 19->86 88 Contains functionality to inject code into remote processes 19->88 90 Writes to foreign memory regions 19->90 104 3 other signatures 19->104 34 lsass.exe 19->34 injected 37 svchost.exe 19->37 injected 39 svchost.exe 19->39 injected 44 26 other processes 19->44 92 Antivirus detection for dropped file 24->92 94 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 24->94 96 Drops PE files to the user root directory 24->96 98 Uses schtasks.exe or at.exe to add and modify task schedules 24->98 62 147.185.221.26, 43160, 49722, 49724 SALSGIVERUS United States 26->62 64 pastebin.com 104.20.4.235, 443, 49699, 49701 CLOUDFLARENETUS United States 26->64 66 172.67.19.24, 443, 49715, 49719 CLOUDFLARENETUS United States 26->66 48 C:\Users\Public\DeadM.exe, PE32 26->48 dropped 100 Protects its processes via BreakOnTermination flag 26->100 42 schtasks.exe 1 26->42         started        102 Multi AV Scanner detection for dropped file 30->102 file9 signatures10 process11 dnsIp12 68 Installs new ROOT certificates 34->68 70 Writes to foreign memory regions 34->70 72 System process connects to network (likely due to code injection or exploit) 37->72 58 pastebin.com 39->58 60 bg.microsoft.map.fastly.net 39->60 46 conhost.exe 42->46         started        signatures13 74 Connects to a pastebin service (likely for C&C) 58->74 process14
Threat name:
ByteCode-MSIL.Ransomware.CryptConsole
Status:
Malicious
First seen:
2025-03-13 17:16:16 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xworm bootkit defense_evasion discovery execution persistence rat trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Writes to the Master Boot Record (MBR)
Adds Run key to start application
Command and Scripting Interpreter: PowerShell
Enumerates connected drives
Checks BIOS information in registry
Checks computer location settings
Drops startup file
Executes dropped EXE
Indicator Removal: Clear Windows Event Logs
Sets service image path in registry
Detect Xworm Payload
Modifies security service
Suspicious use of NtCreateUserProcessOtherParentProcess
Xworm
Xworm family
Unpacked files
SH256 hash:
e11d5fa18b5e000654afdd60c67df0cfc0ae4146ac1068f06b20e2b59be715e3
MD5 hash:
abb3a1f9959d2cad6e28c5f4828c89f7
SHA1 hash:
8058d6219f0cf70e8450a826bf971fcf6b7b3ed8
SH256 hash:
18294ee5a6383a48d1bcf2703f17d815529df3a17580e027c3efea1800900e8f
MD5 hash:
b8479a23c22cf6fc456e197939284069
SHA1 hash:
b2d98cc291f16192a46f363d007e012d45c63300
SH256 hash:
97480da9c84efef100c8296dc95ac5b3207fe2d0741d0b0006924b85b03640cd
MD5 hash:
52264548c3014054e0f2d35d94ebcb69
SHA1 hash:
bf88fb877b7a812230a91bbe72d3b0c7a36f919a
Detections:
win_xworm_w0 XWorm win_mal_XWorm INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA MALWARE_Win_AsyncRAT MALWARE_Win_XWorm
SH256 hash:
5e74cadc4c72f68cead0d54855ae4da3ca130314c5baf57d29ffa64ebddbbd4a
MD5 hash:
7a9d6790054767b0af9ad8b5d74dc7a9
SHA1 hash:
c2a8e6fd143626847b5ab66e8859621cc3b4e658
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:CAS_Malware_Hunting
Author:Michael Reinprecht
Description:DEMO CAS YARA Rules for sample2.exe
Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__MemoryWorkingSet
Author:Fernando Mercês
Description:Anti-debug process memory working set size check
Reference:http://www.gironsec.com/blog/2015/06/anti-debugger-trick-quicky/
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:MALWARE_Win_R77
Author:ditekSHen
Description:Detects r77 rootkit
Rule name:meth_peb_parsing
Author:Willi Ballenthin
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:pe_imphash
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Windows_Rootkit_R77_d0367e28
Author:Elastic Security
Reference:https://www.elastic.co/security-labs/elastic-security-labs-steps-through-the-r77-rootkit

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_TRUST_INFORequires Elevated Execution (level:requireAdministrator)high

Comments