XWorm

48
Global rank
6
Month rank
5
Week rank
651
IOCs

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Remote Access Trojan
Type
Ex-USSR
Origin
15 July, 2022
First seen
24 September, 2023
Last seen

How to analyze XWorm with ANY.RUN

Remote Access Trojan
Type
Ex-USSR
Origin
15 July, 2022
First seen
24 September, 2023
Last seen

IOCs

IP addresses
147.185.221.16
193.233.255.34
140.228.29.162
89.23.97.12
62.233.57.160
89.23.96.35
191.101.130.18
77.91.97.108
89.247.168.214
188.72.124.143
172.111.138.90
83.143.112.45
147.185.221.180
146.70.38.102
146.70.38.43
146.70.38.39
81.30.168.88
217.254.130.233
173.0.60.172
209.145.51.44
Hashes
60e65ec9c9483807cb10e495020da97b7cf381daee13d9a881db398fe5910cb3
af8730dff83b15ded05e0fe1ec207fad27c49d4e857089efabc8e08e863aadfb
11b649bce5b7ff9139d28eec807857ef7536aede719a473d8cd2b0cac1f55d79
64c704cc732ce9a319d2cdb5d5e8abdae0b17d241275a569f1ae73b2c5902e44
d1b0cb76d6ff1e54e5669cc3ba76ba6224be19e721cc61a9e223a596a9bb332f
c86be440981bb4a5efb172d3d65a7a6acaa76091aef48cb4442fefba91ca7756
eb5b70ed334037ecadca5f546bb7ce13c6eeee2426c8986e9f319c857a84fe65
4584fbeede1219e5c5a366d02c35819f331cfadd404992f271183068de436d01
6d786c9598e3960334d353d1230fee5d0cabef129056ab63a437c79a3fac6f18
15759b6a6fa2681cb21fdf00e7b4d8ac61a6ed97c3e1df08fb1b14ca4bf25e5e
60f6b8d0595e720eb6e5394ef7d93de31e9e51b2e74eff5afa8e7644a0fb9624
56d4dbd1baaef0251c8eddedba828f24857f5f36e46b78e146c13fd814a372af
f9d7569c8a07239001e8eb6e8915d922821f53a37328c67f390d64b8d594623d
0100d241e3780df058decceea7cd1198f8bc056ae10aa61c2ca83d749cdbdea7
c0bd1ebdf30196efe9f0f562dcccc143ece619994ca14170e88f87ad402cdffa
73ba241095092dff6d34327da668248d99e326aa1e6ea9896a132173ff6ccee0
415368c42994976a96d870c801364a58a56ace26be19dab123bb0c45f788c105
587233ef6d33f3add414d817deace85bd70e6c0a1c6503035bcf584a2384c837
b2a6d72b7ef0db39ed257575566f197748fb0674886480af8d7902802b73a873
b7170e94b3a2ec031089109abbaf0efb26023ea84a242171cca7dff834a84a45
Domains
copy-marco.gl.at.ply.gg
stores-anytime.at.ply.gg
16.ip.gl.ply.gg
6.tcp.eu.ngrok.io
0.tcp.eu.ngrok.io
soaremic123-35420.portmap.host
trial-pour.at.ply.gg
wiz.bounceme.net
society-painted.at.ply.gg
180.ip.ply.gg
topics-junior.at.ply.gg
xyoptotway.work.gd
chydnoy-24488.portmap.io
4.tcp.eu.ngrok.io
chikes17.duckdns.org
futurist2.ddns.net
borik.duckdns.org
mycoolhostlol.ddns.net
according-psp.at.ply.gg
batman111.ddns.net
URLs
https://pastebin.com/raw/H3wFXmEi:<123456789>
https://pastebin.com/raw/IP:PORT:KEY
https://pastebin.com/raw/yppjG8bz
https://pastebin.com/raw/nAXieb7q
https://pastebin.com/raw/2L3vs8UY
https://pastebin.com/raw/GUtADUQ5
https://pastebin.com/raw/iVUhhYa8
https://pastebin.com/raw/Q2AUANEc
https://pastebin.com/raw/S0j6LcjH
Last Seen at

Recent blog posts

Malware Analysis for Keeping Up with the Late...
watchers 465
comments 0
ChatGPT-powered Malware Analysis: Review Sand...
watchers 2477
comments 2
How to Hire the Right Malware Analyst for You...
watchers 663
comments 0

What is XWorm malware?

XWorm is a remote access trojan (RAT) that gives cybercriminals unauthorized access to a victim's computer. It is a modular malware, meaning that it can be customized to perform a variety of malicious tasks, such as stealing sensitive data and cryptocurrency, launching DDoS attacks, and deploying ransomware. It first came into the spotlight in July 2022 and is believed to have originated in the ex-USSR.

XWorm is sold as a malware-as-a-service (MaaS), which makes it extremely dangerous. It lowers the barrier to entry and opens hacking opportunities to more people. Since its first appearance in the global threat landscape in July 2022, XWorm has gone through several iterations. As of August 2023, the 4.2 version and the 5.0 version were the latest ones available for purchase.

Criminals use multi-stage attacks to deploy XWorm on victims’ computers. For example, an attack might start with a phishing email that contains a malicious Word document attachment. When the document is opened, it will load an .rtf file from an external link. This file will contain an Excel spreadsheet with macros that will execute a PowerShell script, which will then download XWorm onto the computer.

Technical details of the XWorm malicious software

XWorm is developed with the .NET Framework, which makes it a significant threat to Windows systems. The malware is also configurable, offering a wide range of tools for manipulating the infected machine.

Here are some of XWorm’s key capabilities:

  • Encrypted connection: XWorm is capable of maintaining a secure connection with its C&C server, even during poor network conditions.
  • Information gathering: The malware can collect a wide range of information from the infected computer, including credit card numbers, browsing history, bookmarks, downloads, as well as Firefox and Chromium passwords and cookies.
  • Account hijacking: XWorm can hack Discord, Telegram, and MetaMask accounts, as well as get hold of WiFi keys and product keys.
  • User activity tracking: The malware enables attackers to monitor the victim’s activities on their computer by logging their keystrokes, automatically saving webcam images, listening to their microphone, scanning their network connections, and viewing opened windows.
  • Clipboard access: XWorm can retrieve the information that has been copied to the clipboard and replace victims’ crypto wallet credentials with those of the attacker.
  • File management: It can gain control of a computer’s file system to transfer sensitive documents and content to its C2 or download additional malware and run it.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

In order to bypass User Account Control (UAC), XWorm attempts to get administrator permissions on the infected computer. This allows it to make changes to the system without requiring user consent. To ensure persistence, the malware adds itself to the list of programs that run automatically when the computer starts up by editing the registry.

It is also polymorphic, meaning that the malware’s code regularly transforms itself to throw detection software off course. Although XWorm has a built-in functionality to terminate its execution once it senses that it is launched in a virtualized environment, the ANY.RUN sandbox has no problem identifying the malware.

XWorm’s configuration

XWorm’s configuration

Execution process of XWorm

The malicious behavior of XWorm can be easily uncovered by uploading it to the ANY.RUN sandbox. Here is a sample of this malware on the platform.

Immediately upon execution, XWorm drops an executable file into the Startup directory (“C:\Users\admin/AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XWorm.exe”) and into the Roaming directory (“C:\Users\admin/AppData\Roaming\XWorm.exe”).

For the latter directory, a persistent service is created using the Task Scheduler. Malware checks for an external IP, which we can bypass with ANY.RUN’s Residential Proxy feature. After this, XWorm starts sending beacons to the C&C server, waiting for commands to execute.

XWorm’s process graph

XWorm’s process graph

Distribution methods of the XWorm malware

As with most malware families, email phishing campaigns serve as XWorm’s main gateway to victims’ computers. The attack begins with an email containing an attachment. By exploiting different social engineering techniques, threat actors can persuade a user to download the attached file and open it.

Analysts have observed several file formats used by attackers, including .rtf, .lnk, and .pdf. In most cases, the email attachment itself does not contain any macros and is used primarily to kick off a chain reaction that involves downloading several other files, executing PowerShell scripts, and finally delivering the payload.

Such attacks can be facilitated by specialized tools, such as Freeze[.]rs and SYK Crypter, which are equipped with advanced capabilities for circumventing defense systems to drop a variety of malware families including Remcos RAT, njRAT, and RedLine Stealer.

One of the most recent XWorm attacks targeted businesses in Germany. It involved sending a .docx document to victims with a name that suggested it contained hotel reservation information. Instead of using macros, the file exploited the Follina vulnerability (CVE-2022-30190) to run external malicious files and a PowerShell script, which eventually dropped XWorm.

Conclusion

XWorm retains considerable staying power due to the consistent updates and wide availability, making it a top concern for organizations around the world. To protect your system from this threat, you need to have a stricter approach towards handling any links or files arriving in your inbox from unknown senders.

Instead of downloading documents and opening URLs, you can first analyze them in the ANY.RUN sandbox to quickly understand whether the file is malicious or not. ANY.RUN also provides you with a detailed report about the malware, such as its IOCs and TTPs. This information can be used to protect your organization from future attacks.

Try ANY.RUN for free – request a demo!

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy