Xworm

Malware updated 3 days ago (2024-10-15T10:01:34.432Z)
Download STIX
Preview STIX
XWorm is a sophisticated piece of malware designed to infiltrate and exploit computer systems, often without the user's knowledge. It can be delivered through various means such as suspicious downloads, emails, or websites, and once inside a system, it can steal personal information, disrupt operations, or even hold data hostage for ransom. The malware was found in a machine running ScreenConnect client software, and its presence was confirmed through analysis of the svchost.com file using tools like DiE and ExeInfo. This analysis revealed that the file was part of the XWorm malware family and was protected by .NET Reactor. Threat actors have been observed using XWorm in conjunction with other malicious tools such as Async RAT before delivering LockBit payloads built using the leaked Lockbit Black builder. These campaigns utilize an array of tools and malware, including AgentTesla, FormBook, Remcos, LokiBot, GuLoader, Snake Keylogger, and XWorm. In one scenario, a Microsoft Word document initiated a chain leading to the installation of Remcos RAT, while another attack chain deployed XWorm RAT through an Excel file and LokiBot through an RTF document. The XWorm malware is particularly dangerous due to its ability to maintain a connection with the attackers' command-and-control (C2) server and drop plugins including Remcos RAT, XWorm, NanoCore RAT, and a stealer designed for specific crypto wallets. Notably, XWorm can load ransomware or act as a persistent backdoor, giving attackers complete system control to capture keystrokes, screenshots, credentials, and other sensitive information. Following injection and environment verification, the shellcode executes the final malware, XWorm, thereby completing the infection process.
Description last updated: 2024-10-15T09:28:54.711Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Malware
Rat
Remcos
Payload
Trojan
Windows
Ransomware
Github
Screenconnect
Injector
Hp
ConnectWise
Vulnerability
Exploit
Fortiguard
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
Alias DescriptionAssociation TypeVotes
The Agenttesla Malware is associated with Xworm. AgentTesla is a well-known remote access trojan (RAT) that has been used extensively in cybercrime operations. It infiltrates systems through various methods, including malicious emails and suspicious downloads. Once inside, it can steal personal information, disrupt operations, or hold data hostageUnspecified
4
The AsyncRAT Malware is associated with Xworm. AsyncRAT is a malicious software (malware) that infiltrates systems through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, it can steal personal information, disrupt operations, or even hold your data hostage for ransom. It has recently risen to prominence, raUnspecified
2
The Lockbit Malware is associated with Xworm. LockBit is a notorious malware that operates on a ransomware-as-a-service model, which has been responsible for significant cyber attacks across the globe. One of its most high-profile targets was Boeing, from whom the LockBit gang claimed to have stolen data. This incident not only disrupted operatUnspecified
2
The Agent Tesla Malware is associated with Xworm. Agent Tesla is a well-known malware that primarily targets systems through phishing attacks, exploiting an outdated Microsoft Office vulnerability (CVE-2017-11882). This malicious software is designed to infiltrate computer systems, often without the user's knowledge, and can steal personal informatUnspecified
2
The IcedID Malware is associated with Xworm. IcedID is a type of malware, malicious software designed to exploit and damage computer systems. It has been identified in association with various other malwares such as Qakbot, BazarLoader, CobaltStrike, Conti, Gozi, Trickbot, Quantum, Emotet, and Pikabot. The IcedID IntBot Loader (int-bot.dll) isUnspecified
2
The Lokibot Malware is associated with Xworm. LokiBot is a malicious software, or malware, that was first reported on October 24, 2020. It is designed to exploit and damage computer systems by infiltrating them through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, LokiBot steals personal informationUnspecified
2
The NETWIRE Malware is associated with Xworm. NetWire is a type of malware, specifically a remote access trojan (RAT), that has been utilized for various malicious activities since at least 2014. Initially promoted as a legitimate tool for managing Windows computers remotely, NetWire was quickly adopted by cybercriminals and used in phishing atUnspecified
2
The QakBot Malware is associated with Xworm. Qakbot is a potent piece of malware, or malicious software, that infiltrates computer systems through suspicious downloads, emails, or websites. Once installed, it can steal personal information, disrupt operations, or even hold data hostage for ransom. This malware, built by various groups includinUnspecified
2
The Redline Malware is associated with Xworm. RedLine is a type of malware, a malicious software designed to exploit and damage computer systems. It can infiltrate systems through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, RedLine can steal personal information, disrupt operations, or deliver further Unspecified
2
Associated Vulnerabilities
To see the evidence that has resulted in these vulnerability associations, create a free account
Alias DescriptionAssociation TypeVotes
The Follina Vulnerability is associated with Xworm. Follina (CVE-2022-30190) is a software vulnerability that was discovered and exploited in the first half of 2022. It was weaponized by TA413, a malicious entity known for its cyber attacks, shortly after its discovery and publication. The vulnerability was used to target the Sophos Firewall product,Unspecified
2
Source Document References
Information about the Xworm Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
InfoSecurity-magazine
3 days ago
SANS ISC
a month ago
Contagio
a month ago
SANS ISC
2 months ago
InfoSecurity-magazine
3 months ago
Checkpoint
4 months ago
BankInfoSecurity
6 months ago
DARKReading
6 months ago
Fortinet
6 months ago
Malware-traffic-analysis.net
7 months ago
CERT-EU
7 months ago
BankInfoSecurity
7 months ago
CERT-EU
7 months ago
CERT-EU
7 months ago
CERT-EU
8 months ago
Securityaffairs
8 months ago
CERT-EU
8 months ago
Trend Micro
8 months ago
CERT-EU
8 months ago
Fortinet
8 months ago