MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e8107d0a4bea46232f24631c246c90eb89d022c6c95d4cf968ed6edc8495fe04. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XWorm


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: e8107d0a4bea46232f24631c246c90eb89d022c6c95d4cf968ed6edc8495fe04
SHA3-384 hash: a1c65d94af607f7ca2d4ab1074500d63f490b69c7aac31462009673375f3f87fc5581a3f1af850889780cf9f20b4d1a3
SHA1 hash: 3144b6209ee17f4f79941dcd6b58e4e4a00a1003
MD5 hash: 7dccfd816603f31309b243d2b66a9987
humanhash: football-five-nineteen-tennis
File name:enuvvy.bat
Download: download sample
Signature XWorm
File size:472 bytes
First seen:2023-08-03 07:54:35 UTC
Last seen:Never
File type:Batch (bat) bat
MIME type:text/x-msdos-batch
ssdeep 12:weJCaq81kkGr5pYuDRN3L81kkGVX5lDQ981kvYAp5DFYRlr+1kVv:w/RrPYiRxbRxfDkvYAp5DFYRlr+1ev
TLSH T1C5F05C3706163116FF27C175A115B380961B92840E0E759317AEC8657D825E5CBEB5FC
Reporter JAMESWT_WT
Tags:108-62-118-133--9734 bat xworm

Intelligence


File Origin
# of uploads :
1
# of downloads :
131
Origin country :
IT IT
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
enuvvy.bat
Verdict:
Malicious activity
Analysis date:
2023-08-02 21:51:06 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Launching a process
Сreating synchronization primitives
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a file in the %temp% directory
Creating a window
Searching for synchronization primitives
Creating a process from a recently created file
Creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
powershell
Result
Verdict:
MALICIOUS
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Drops PE files with a suspicious file extension
Found malware configuration
Malicious sample detected (through community Yara rule)
Potentially malicious time measurement code found
Powershell drops PE file
Suspicious powershell command line found
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1284943 Sample: enuvvy.bat Startdate: 03/08/2023 Architecture: WINDOWS Score: 92 47 Found malware configuration 2->47 49 Malicious sample detected (through community Yara rule) 2->49 51 Yara detected XWorm 2->51 53 C2 URLs / IPs found in malware configuration 2->53 8 cmd.exe 3 2 2->8         started        process3 signatures4 55 Suspicious powershell command line found 8->55 11 goal.com 1 8->11         started        14 powershell.exe 14 14 8->14         started        18 powershell.exe 16 8->18         started        20 3 other processes 8->20 process5 dnsIp6 57 Bypasses PowerShell execution policy 11->57 59 Adds a directory exclusion to Windows Defender 11->59 61 Potentially malicious time measurement code found 11->61 22 powershell.exe 11 11->22         started        24 powershell.exe 11 11->24         started        26 powershell.exe 11 11->26         started        45 files.catbox.moe 108.181.20.35, 443, 49720, 49721 ASN852CA Canada 14->45 37 C:\Users\user\AppData\Local\Temp\info.pdf, PDF 14->37 dropped 63 Drops PE files with a suspicious file extension 14->63 65 Powershell drops PE file 14->65 39 C:\Users\user\AppData\Local\Temp\goal.zip, Zip 18->39 dropped 41 C:\Users\user\AppData\Local\Temp\...\goal.com, PE32+ 20->41 dropped 28 RdrCEF.exe 67 20->28         started        file7 signatures8 process9 dnsIp10 31 conhost.exe 22->31         started        33 conhost.exe 24->33         started        35 conhost.exe 26->35         started        43 192.168.2.1 unknown unknown 28->43 process11
Threat name:
Script.Trojan.Malgent
Status:
Malicious
First seen:
2023-08-03 00:50:39 UTC
File Type:
Text (Batch)
AV detection:
3 of 38 (7.89%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Executes dropped EXE
Blocklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments