MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e6bb646f56c9c4807ee6aa5d50101b0bc1240f748e6c9c12a3f673f2f828d10f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XWorm


Vendor detections: 17


Intelligence 17 IOCs YARA 4 File information Comments

SHA256 hash: e6bb646f56c9c4807ee6aa5d50101b0bc1240f748e6c9c12a3f673f2f828d10f
SHA3-384 hash: b22d9351aba6f1b193045e77a3b5d234babab95d920ce1c615d281ece4607c26643ea5e98ab195c311c483a3cd91057f
SHA1 hash: 29fd27e9b165631a8cf903166e75ec1e7d6df986
MD5 hash: ff617fc5d1968e2d95a7aec28cefac4a
humanhash: mississippi-enemy-west-ten
File name:ff617fc5d1968e2d95a7aec28cefac4a.exe
Download: download sample
Signature XWorm
File size:701'440 bytes
First seen:2026-03-24 08:50:56 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'853 x AgentTesla, 19'779 x Formbook, 12'304 x SnakeKeylogger)
ssdeep 12288:iDaqcak6kuuk26BN+X4QG7MAB6J/zzBsdXGSQtTjJq/pV14J5cvTBg11EQ5rXH98:4agUK7MABYK2uxb4STBa5rXH9c7oI
Threatray 5 similar samples on MalwareBazaar
TLSH T177E4CE621E567F48C63E0BB8C027098873F089539283D76B7EFD51F54AA3BC6CA17946
TrID 73.9% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
6.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.6% (.EXE) Win64 Executable (generic) (6522/11/2)
4.5% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter abuse_ch
Tags:exe xworm

Intelligence


File Origin
# of uploads :
1
# of downloads :
118
Origin country :
SE SE
Vendor Threat Intelligence
Malware configuration found for:
DeepSea
Details
DeepSea
DeepSea decrypted strings
Malware family:
ID:
1
File name:
QUOTATION MTL #009447222.pdf(68KB).com
Verdict:
Malicious activity
Analysis date:
2026-03-24 07:39:02 UTC
Tags:
auto-reg netreactor auto-startup xworm remote rat remcos stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Connection attempt
Launching a process
Creating a file
Сreating synchronization primitives
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Creating a file in the mass storage device
Query of malicious DNS domain
Unauthorized injection to a system process
Enabling autorun by creating a file
Enabling threat expansion on mass storage devices
Gathering data
Verdict:
Malicious
File Type:
exe x32
Detections:
Trojan-Dropper.Win32.Injector.sb Trojan.Win32.Agent.sb Trojan.MSIL.Inject.sb HEUR:Trojan-PSW.MSIL.Agensla.gen Backdoor.Win32.Androm.sb Trojan.WinLNK.Agent.fb Trojan.MSIL.Inject.b HEUR:Trojan-Spy.WinLNK.Xegumumune.gen Backdoor.MSIL.XWorm.b
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
DarkTortilla, XWorm
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Creates autostart registry keys with suspicious values (likely registry only malware)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Suricata IDS alerts for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected DarkTortilla Crypter
Yara detected MSIL Injector
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1888058 Sample: oiKD67S99O.exe Startdate: 24/03/2026 Architecture: WINDOWS Score: 100 28 wqo9.firewall-gateway.de 2->28 30 keyauth.win 2->30 42 Suricata IDS alerts for network traffic 2->42 44 Found malware configuration 2->44 46 Antivirus detection for URL or domain 2->46 48 11 other signatures 2->48 7 oiKD67S99O.exe 3 2->7         started        11 VersionUpdate.exe 4 2->11         started        13 VersionUpdate.exe 3 2->13         started        signatures3 process4 file5 26 C:\Users\user\AppData\...\oiKD67S99O.exe.log, ASCII 7->26 dropped 50 Writes to foreign memory regions 7->50 52 Allocates memory in foreign processes 7->52 54 Hides that the sample has been downloaded from the Internet (zone.identifier) 7->54 56 Injects a PE file into a foreign processes 7->56 15 InstallUtil.exe 2 7 7->15         started        20 conhost.exe 11->20         started        22 conhost.exe 13->22         started        signatures6 process7 dnsIp8 32 wqo9.firewall-gateway.de 91.92.241.145, 49691, 59013 THEZONEBG Bulgaria 15->32 24 C:\Users\user\AppData\...\VersionUpdate.exe, PE32 15->24 dropped 34 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 15->34 36 Creates autostart registry keys with suspicious values (likely registry only malware) 15->36 38 Tries to harvest and steal browser information (history, passwords, etc) 15->38 40 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 15->40 file9 signatures10
Verdict:
inconclusive
YARA:
10 match(es)
Tags:
.Net Executable Managed .NET PE (Portable Executable) PE File Layout SOS: 0.84 Win 32 Exe x86
Threat name:
Win32.Trojan.Jalapeno
Status:
Malicious
First seen:
2026-03-24 08:51:38 UTC
File Type:
PE (.Net Exe)
Extracted files:
11
AV detection:
18 of 36 (50.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xworm collection discovery persistence rat trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Adds Run key to start application
.NET Reactor proctector
Drops startup file
Executes dropped EXE
Detect Xworm Payload
Xworm
Xworm family
Unpacked files
SH256 hash:
e6bb646f56c9c4807ee6aa5d50101b0bc1240f748e6c9c12a3f673f2f828d10f
MD5 hash:
ff617fc5d1968e2d95a7aec28cefac4a
SHA1 hash:
29fd27e9b165631a8cf903166e75ec1e7d6df986
SH256 hash:
18bf646fad26a0aa1264cac867789c6d9f4de762bc83b9aeeff0f8d8d48ee6ac
MD5 hash:
4faf9d90e22fe6f5452ab806bb763ed7
SHA1 hash:
564455391f73d9d8f3baf3b907dfb9723f249820
SH256 hash:
8995d7eca4de6c7c0c1a761c877e4e7c80de63bd361c8aaee1bbd66fd4c9dfc3
MD5 hash:
a5543a26919050e9c0313e29b9fc43c2
SHA1 hash:
aa89566831accff7db683d0e1abdfd9265433a2f
SH256 hash:
69b83d39655ef00f775e5bc22b91874d629e68319550000343c581318fbe6fd4
MD5 hash:
b02d83e8ecf71c6399a3b3be638fb93b
SHA1 hash:
dfaff9ecb5aeab521334bf05aa7832d3d9af9451
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments