Since its emergence in 2022, XWorm, a powerful piece of malware developed by the threat actor EvilCoder, has evolved into a highly versatile and modular tool. It’s often distributed through phishing emails and bogus websites that trick users into downloading malicious files. The malware is designed with a core client and a variety of specialized components, or “plugins,” that allow it to perform a broad spectrum of harmful actions. These actions include stealing data, recording keystrokes, capturing screenshots, and even deploying ransomware. Despite some past setbacks, including a period of apparent dormancy, XWorm has made a powerful return, highlighting the persistent and adaptable nature of modern cyber threats.
The key to XWorm’s potency is its modular design. The core malware client can download and execute a range of plugins from a command-and-control (C2) server, allowing an attacker to customize the malware’s functionality on the fly. This architecture allows XWorm to evade detection and analysis by checking for signs of a virtualized environment before executing its full payload. The latest version, XWorm 6.0, supports over 35 different plugins, each designed for a specific purpose. These plugins include tools for accessing and manipulating filesystems, executing system commands, gathering information on the victim’s machine, and even creating a remote desktop session. This adaptability makes it a “Swiss Army knife” of malware, capable of fitting into almost any attack scenario.
XWorm has been observed using various tactics to infect systems and avoid detection. A common infection method involves malicious JavaScript files sent via phishing emails. When a user opens the file, it displays a decoy PDF document while silently executing PowerShell code in the background. This code then injects the XWorm malware into a legitimate Windows process, like RegSvcs.exe, to remain hidden. The malware also incorporates anti-analysis and anti-evasion mechanisms, which check for tell-tale signs of a virtualized environment and cease execution if detected. This multi-layered approach to infection and evasion makes XWorm a particularly difficult threat to defend against.
After an abrupt and unexpected shutdown by its developer, a new version of the malware, XWorm 6.0, was offered for sale on cybercrime forums. This new version, described as “fully re-coded,” boasts a wider array of plugins and a fix for a previously discovered vulnerability. The return of XWorm with this new, more powerful version illustrates a trend in the cybercriminal underground: when a popular tool disappears, it often re-emerges under new management or a new version. The developers of XWorm 6.0, and those distributing it, have also been observed to be a part of a vicious cycle, where a cracked version of the software itself contains malware, infecting other threat actors who download it.
In addition to its own plugins, XWorm 6.0 has been used to distribute other malware families, including various stealers, keyloggers, and remote access trojans. These secondary infections demonstrate how XWorm serves as a gateway for other malicious activities, extending the reach and impact of an initial attack. The re-emergence of XWorm, armed with a versatile array of plugins for everything from credential theft to ransomware, serves as a powerful reminder that no malware threat is ever truly gone. It emphasizes the critical importance of a robust cybersecurity posture and highlights the constant need for vigilance against evolving and persistent threats.
Reference: