Want More XWorm?

    Published: 2026-03-04. Last Updated: 2026-03-04 09:48:39 UTC
    by Xavier Mertens (Version: 1)
    0 comment(s)

    And another XWorm[1] wave in the wild! This malware family is not new and heavily spread but delivery techniques always evolve and deserve to be described to show you how threat actors can be imaginative! This time, we are facing another piece of multi-technology malware.

    Here is a quick overview:

    The Javascript is a classic obfuscated one:

    No need to try to analyze it, just let it run in a sandbox and see its magic. It will drop a PowerShell script in a temporary directory (“C:\Temp\ps_5uGUQcco8t5W_1772542824586.ps1”). This loader will decode (Base64 + XOR) another payload that invokes another piece of PowerShell in memory:

    Because the last payload is XOR-encrypted, it is not obfuscated and easy to understand. The DLL exports a function called “ProcessHollowing” (nice name, btw) and acts as a loader. It inject the XWorm client in the .Net compiler process…

    Here is the extracted config:

    {
        "c2": [
            "204[.]10[.]160[.]190:7003"
        ],
        "attr": {
            "install_file": "USB.exe"
        },
        "keys": [
            {
                "key": "aes_key",
                "kind": "aes.plain",
                "value": "XAorWEAzx4+ic89KWd910w=="
            }
        ],
        "rule": "Xworm",
        "mutex": [
            "Cqu1F0NxohroKG5U"
        ],
        "family": "xworm",
        "version": "XWorm V6.4"
    }

    Do you recognize the C2 IP address? It's the same as the one detected in my latest diary![2]

    And some IOC's:

    File SHA256
    Inv-4091-CBM-4091-CUSTOM-Packing_List.js 5140b02a05b7e8e0c0afbb459e66de4d74f79665c1d83419235ff0cdcf046e9c
    ps_5uGUQcco8t5W_1772542824586.ps1 5a3d33efaaff4ef7b7d473901bd1eec76dcd9cf638213c7d1d3b9029e2aa99a4
    MAD.dll af3919de04454af9ed2ffa7f34e4b600b3ce24168f745dba4c372eb8bcc22a21
    payload.exe (XWorm) 58e38fffb78964300522d89396f276ae0527def8495126ff036e57f0e8d3c33b

    [1] https://malpedia.caad.fkie.fraunhofer.de/details/win.xworm
    [2] https://isc.sans.edu/diary/Fake%20Fedex%20Email%20Delivers%20Donuts!/32754

    Xavier Mertens (@xme)
    Xameco
    Senior ISC Handler - Freelance Cyber Security Consultant
    PGP Key

    0 comment(s)
    ISC Stormcast For Wednesday, March 4th, 2026 https://isc.sans.edu/podcastdetail/9834

      Comments


      Diary Archives