MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f8a021222ad2ca32a7b3562f643d95401efca4ccd44c814f6107a0c828bee235. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XWorm


Vendor detections: 12


Intelligence 12 IOCs YARA 2 File information Comments

SHA256 hash: f8a021222ad2ca32a7b3562f643d95401efca4ccd44c814f6107a0c828bee235
SHA3-384 hash: 5b02ee32c7746a23853aefd200cf1b182cdd798fcb39b35ed3d72cbda2f48e13f847cef4ba9f4bd17037346dbdac0fea
SHA1 hash: 099ae11a503b6aa026ccce9960327ce162511c4f
MD5 hash: 3d8e55da456380fb8a608f177bfa32f4
humanhash: hawaii-triple-tennis-freddie
File name:file.exe
Download: download sample
Signature XWorm
File size:520'252 bytes
First seen:2023-05-26 05:22:48 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash aac51396886833dc961fcd7aab7711e4 (11 x NetSupport, 7 x DCRat, 4 x njrat)
ssdeep 6144:lgZiAEAO0sByNsAal3gVAWgS7/OhwjKz1Jo7KBGHjaMI6zPQE:lgZXEAO/BUdG3gVdt7Kjz1JPkDaMbN
Threatray 18 similar samples on MalwareBazaar
TLSH T122B4BE0276C44972E1B229325A75DB309A7BBC201A7589CF97DC4C5FBF736C09A31B62
TrID 91.0% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
3.6% (.EXE) Win64 Executable (generic) (10523/12/4)
1.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.5% (.EXE) Win32 Executable (generic) (4505/5/1)
0.6% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 0000000000000000 (872 x AgentTesla, 496 x Formbook, 296 x RedLineStealer)
Reporter abuse_ch
Tags:exe Telegram xworm

Intelligence


File Origin
# of uploads :
1
# of downloads :
272
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file.exe
Verdict:
Malicious activity
Analysis date:
2023-05-26 05:25:57 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Changing a file
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process from a recently created file
Creating a file
Enabling the 'hidden' option for files in the %temp% directory
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-vm greyware lolbin overlay packed setupapi.dll shdocvw.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected Generic Downloader
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 876143 Sample: file.exe Startdate: 26/05/2023 Architecture: WINDOWS Score: 100 25 Multi AV Scanner detection for domain / URL 2->25 27 Found malware configuration 2->27 29 Malicious sample detected (through community Yara rule) 2->29 31 6 other signatures 2->31 9 file.exe 9 2->9         started        process3 process4 11 cmd.exe 2 9->11         started        file5 23 C:\Users\user\AppData\...\Services64.bat.exe, PE32 11->23 dropped 14 Services64.bat.exe 14 11->14         started        17 conhost.exe 11->17         started        process6 signatures7 33 Bypasses PowerShell execution policy 14->33 35 Adds a directory exclusion to Windows Defender 14->35 19 powershell.exe 5 14->19         started        process8 process9 21 conhost.exe 19->21         started       
Threat name:
Win32.Trojan.Smokeloader
Status:
Suspicious
First seen:
2023-05-26 05:23:05 UTC
File Type:
PE (Exe)
Extracted files:
5
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
spyware stealer
Behaviour
Creates scheduled task(s)
Modifies system certificate store
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Unpacked files
SH256 hash:
f8a021222ad2ca32a7b3562f643d95401efca4ccd44c814f6107a0c828bee235
MD5 hash:
3d8e55da456380fb8a608f177bfa32f4
SHA1 hash:
099ae11a503b6aa026ccce9960327ce162511c4f
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:SelfExtractingRAR
Author:Xavier Mertens
Description:Detects an SFX archive with automatic script execution

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments