MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 eebbd9d4ef75d3df6ac77260e7cd1c0c502c2e6de613fdcb5318e96aec37df5b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XWorm


Vendor detections: 12


Intelligence 12 IOCs YARA 4 File information Comments

SHA256 hash: eebbd9d4ef75d3df6ac77260e7cd1c0c502c2e6de613fdcb5318e96aec37df5b
SHA3-384 hash: 0e002a147e01b5c65d5178833f6dba847098feb02b4ee55891e6975c141049f85694520d737e4791779efdc2c0a66f5c
SHA1 hash: 3398058909ef90433ff6325663b1ea9df1051012
MD5 hash: ab7752fab3f572161a2a7afd8e2a25ac
humanhash: solar-maryland-yankee-nebraska
File name:HGU98765456789000.bat
Download: download sample
Signature XWorm
File size:125'149 bytes
First seen:2026-03-16 08:11:44 UTC
Last seen:Never
File type:Batch (bat) bat
MIME type:text/html
ssdeep 3072:eKC6EB9z6Qm433UBNDRFPTcHtw3fm9EI4WwKlySE6/jo9pgMglVc7:ez60dkNlJ1yYAXHq
Threatray 2'885 similar samples on MalwareBazaar
TLSH T1C0C3F10151D47FB89BBC1D1490FA2AA94BE0C38F9766728C9FB7BE8A6FB744042174D4
Magika batch
Reporter lowmal3
Tags:bat xworm

Intelligence


File Origin
# of uploads :
1
# of downloads :
83
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
HGU98765456789000.bat
Verdict:
Malicious activity
Analysis date:
2026-03-16 08:13:54 UTC
Tags:
auto-reg susp-powershell xworm remote

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Verdict:
Malicious
Labled as:
PowerShell/TrojanDropper.Agent
Verdict:
Malicious
File Type:
html
Detections:
PDM:Trojan.Win32.Generic Backdoor.Agent.TCP.C&C Trojan.PowerShell.Cobalt.sb Exploit.Win64.Shellcode.sliverloader.a HEUR:Trojan.BAT.Cobalt.gen Trojan.Win32.Shellcode.sb Backdoor.Win32.Androm.sb Backdoor.MSIL.XWorm.c Trojan-PSW.Win32.Xploder.sb Trojan-Dropper.Win32.Injector.sb Backdoor.MSIL.XWorm.b Backdoor.MSIL.Cardinal.sb Backdoor.MSIL.Agent.sb
Result
Threat name:
DonutLoader, XWorm
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Compiles code for process injection (via .Net compiler)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Creates a thread in another existing process (thread injection)
Drops PE files with benign system names
Encrypted powershell cmdline option found
Found malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: System File Execution Location Anomaly
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Unusual module load detection (module proxying)
Uses attrib.exe to hide files
Uses cmd line tools excessively to alter registry or file data
Writes to foreign memory regions
Yara detected DonutLoader
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1884099 Sample: HGU98765456789000.bat Startdate: 16/03/2026 Architecture: WINDOWS Score: 100 125 keyauth.win 2->125 127 ax-0003.ax-msedge.net 2->127 129 3 other IPs or domains 2->129 161 Found malware configuration 2->161 163 Malicious sample detected (through community Yara rule) 2->163 165 Multi AV Scanner detection for submitted file 2->165 167 16 other signatures 2->167 15 cmd.exe 1 2->15         started        18 explorer.exe 2->18         started        21 mshta.exe 1 2->21         started        23 svchost.exe 2->23         started        signatures3 process4 dnsIp5 187 Suspicious powershell command line found 15->187 189 Uses cmd line tools excessively to alter registry or file data 15->189 191 Encrypted powershell cmdline option found 15->191 197 2 other signatures 15->197 25 cmd.exe 4 15->25         started        29 conhost.exe 15->29         started        131 ax-0003.ax-msedge.net 150.171.27.12, 443, 49694 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 18->131 193 System process connects to network (likely due to code injection or exploit) 18->193 195 Query firmware table information (likely to detect VMs) 18->195 31 cmd.exe 1 21->31         started        133 127.0.0.1 unknown unknown 23->133 signatures6 process7 file8 121 C:\Users\user\AppData\...\explosion.hta, HTML 25->121 dropped 123 C:\Users\user\AppData\Roaming\...\WORLD.cmd, HTML 25->123 dropped 181 Suspicious powershell command line found 25->181 183 Uses cmd line tools excessively to alter registry or file data 25->183 185 Encrypted powershell cmdline option found 25->185 33 powershell.exe 30 25->33         started        37 powershell.exe 16 25->37         started        39 conhost.exe 25->39         started        45 3 other processes 25->45 41 cmd.exe 1 31->41         started        43 conhost.exe 31->43         started        signatures9 process10 file11 105 C:\Users\user\AppData\...\2evce5op.cmdline, Unicode 33->105 dropped 149 Injects code into the Windows Explorer (explorer.exe) 33->149 151 Writes to foreign memory regions 33->151 153 Creates a thread in another existing process (thread injection) 33->153 47 explorer.exe 9 5 33->47 injected 51 csc.exe 3 33->51         started        54 csc.exe 3 33->54         started        107 C:\Users\user\AppData\Local\...\Dominate.ps1, Unicode 37->107 dropped 155 Found suspicious powershell code related to unpacking or dynamic code loading 37->155 157 Compiles code for process injection (via .Net compiler) 37->157 159 Uses cmd line tools excessively to alter registry or file data 41->159 56 powershell.exe 15 41->56         started        58 conhost.exe 41->58         started        60 reg.exe 1 41->60         started        62 3 other processes 41->62 signatures12 process13 dnsIp14 135 198.23.177.219, 4445, 49691 AS-COLOCROSSINGUS United States 47->135 137 204.79.197.203, 443, 80 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 47->137 139 System process connects to network (likely due to code injection or exploit) 47->139 141 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 47->141 143 Unusual module load detection (module proxying) 47->143 145 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 47->145 64 mshta.exe 47->64         started        66 csc.exe 47->66         started        69 explorer.exe 47->69         started        71 WerFault.exe 47->71         started        115 C:\Users\user\AppData\Local\...\2evce5op.dll, PE32 51->115 dropped 147 Drops PE files with benign system names 51->147 73 cvtres.exe 1 51->73         started        117 C:\Users\user\AppData\Local\...\ywfnmids.dll, PE32 54->117 dropped 75 cvtres.exe 1 54->75         started        file15 signatures16 process17 file18 77 cmd.exe 64->77         started        109 C:\Users\user\AppData\Local\...\explorer.exe, PE32 66->109 dropped 79 conhost.exe 66->79         started        81 cvtres.exe 66->81         started        process19 process20 83 cmd.exe 77->83         started        86 conhost.exe 77->86         started        signatures21 169 Suspicious powershell command line found 83->169 171 Uses cmd line tools excessively to alter registry or file data 83->171 173 Encrypted powershell cmdline option found 83->173 88 powershell.exe 83->88         started        92 conhost.exe 83->92         started        94 attrib.exe 83->94         started        96 3 other processes 83->96 process22 file23 119 C:\Users\user\AppData\Local\...\nxuov5n4.0.cs, C++ 88->119 dropped 175 Injects code into the Windows Explorer (explorer.exe) 88->175 177 Writes to foreign memory regions 88->177 179 Creates a thread in another existing process (thread injection) 88->179 98 csc.exe 88->98         started        101 csc.exe 88->101         started        signatures24 process25 file26 111 C:\Users\user\AppData\Local\...\lh2klhjt.dll, PE32 98->111 dropped 103 cvtres.exe 98->103         started        113 C:\Users\user\AppData\Local\...\nxuov5n4.dll, PE32 101->113 dropped process27
Threat name:
Win32.Trojan.Alevaul
Status:
Malicious
First seen:
2026-03-16 05:17:49 UTC
File Type:
Text (Batch)
AV detection:
11 of 38 (28.95%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:donutloader family:xworm collection defense_evasion execution loader persistence rat trojan
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Views/modifies file attributes
outlook_office_path
outlook_win_path
Accesses Microsoft Outlook profiles
Adds Run key to start application
Command and Scripting Interpreter: PowerShell
Executes dropped EXE
Detect Xworm Payload
Detects DonutLoader
DonutLoader
Donutloader family
Xworm
Xworm family
Malware Config
C2 Extraction:
198.23.177.219:4445
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Base64_Encoded_Powershell_Directives
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:telebot_framework
Author:vietdx.mb

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

XWorm

Batch (bat) bat eebbd9d4ef75d3df6ac77260e7cd1c0c502c2e6de613fdcb5318e96aec37df5b

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments