Take a Product Tour Request a Demo Cybersecurity Assessment Contact Us

Blogs

The latest cybersecurity trends, best practices, security vulnerabilities, and more

Malware-As-A-Service Redefined: Why XWorm is outpacing every other RAT in the underground malware market

Introduction

In the evolving landscape of cybercrime, threat actors are constantly pursuing the "perfect" weapon: malware that is lightweight, modular, and—most importantly—stealthy. The underground market eagerly adopts any tool that balances high functionality with low detection rates. XWorm has emerged as the premier example of this shift. Following the significant disruption caused by XWorm v6.X, the community is now grappling with the even more potent Version 7.x. In this blog, we will see how attackers have tried to target a Taiwan-based network security company.

This analysis dissects the active XWorm v7.1 kill chain, explores the market trends fueling its growth, and exposes the Telegram channels where this sophisticated RAT is sold as a high-tier commodity.

Market Trends

The underground market is currently witnessing competition among commodity malware for cybercrime. XWorm has emerged as the definitive commodity king by surpassing most notorious RAT tools like AsyncRAT and QuasarRAT. XWorm is even competing with emerging RATs like DCRAT in the underground market.

According to the ANY.RUN 2025 Annual Threat Report, XWorm saw a staggering 174% surge in detections over the last year. While legacy tools like Remcos and AgentTesla saw their market rankings drop to 7th and 10th, respectively, XWorm climbed to #3 in the 2025 threat report.

Figure 1: Malware trends for the last 365 days
Figure 1: Malware trends for the last 365 days

Figure 2: Malware trends for the last 30 days
Figure 2: Malware trends for the last 30 days

Figure 3: Malware trends for the last 14 days
Figure 3: Malware trends for the last 14 days

Winning the "RAT Race": Market dominance by the numbers

XWorm dominance isn’t just about the low price tag (averaging a $500 lifetime subscription). It is about market capture through "effective simplicity."

  • Outpacing the giants: In 2025, XWorm detections were 4.3x higher than in 2024. It now accounts for a significant share of the 2 million+ sandbox sessions analyzed by security researchers annually.
  • Massive scale: A single 2025 builder campaign was recently linked to over 18,000 compromised devices, demonstrating its ability to cause "Enterprise-scale" damage at a "clearance bin" price.
  • We have observed that a new Telegram channel is actively pushing updates to the XWorm v7.x version.
Figure 4: Telegram handles distributing XWorm v7.x
Figure 4: Telegram handles distributing XWorm v7.x

Anatomy of an infection: The 2026 XWorm kill chain

We have analysed a new XWorm7.1 infection chain using JavaScript to download secondary payloads instead of a typical LNK file. It performs a "Living off the Land" (LOTL) attack by abusing a legitimate Microsoft utility (Aspnet_compiler.exe) to hide its activity.

Recent telemetry has uncovered a sophisticated infection chain that weaponizes CVE-2025-8088, a high-severity, path-traversal vulnerability affecting WinRAR versions 7.12 and earlier. Threat actors are utilizing Discord as a primary delivery vector, distributing weaponized archives (MD5: 2074283c9ccc441185cba631fcc8a234) disguised as legitimate game modifications or community plugins.

Technically, the exploit leverages NTFS Alternate Data Streams (ADS). The attack does not require a complex multi-stage downloader. Instead, it relies on a crafted archive that abuses the :txt:stream syntax to write files to arbitrary system paths. According to Google Threat Intelligence, this specific vulnerability has become a staple for both state-sponsored and financially motivated actors due to its high reliability and ability to bypass standard user awareness. Organizations are urged to update to WinRAR 7.13+ immediately to mitigate this LOTL execution style.

Note on Analytical Scope: Trellix is actively monitoring this Discord-based WinRAR delivery vector (CVE-2025-8088) and conducting threat hunting to identify relevant data.

Figure 5: Infection chain overview
Figure 5: Infection chain overview

Anatomy view

The 7-stage execution flow

  1. Initial access: Victims receive a phishing email containing a ZIP attachment, such as "MFEQuotation Work request for NCSOCSO.zip".
  2. The JavaScript dropper: Double-clicking the enclosed .JS file triggers wscript.exe and attempts to connect to a remote server (e.g., kolanga[.]cc) to download the primary engine.
  3. Encrypted PowerShell staging: The downloaded PowerShell script serves as a secure container, carrying a large block of encrypted data and a hardcoded AES decryption key.
  4. Living-off-the-Land: The script executes with the -nop and -ep bypass switches to evade safety checks. It then launches the trusted Microsoft application Aspnet_compiler.exe.
  5. In-Memory execution: The script performs Reflective DLL Injection, carving space in the memory of the compiler process to insert the XWormClient Payload.
  6. Data capture: The malware captures every keystroke, saving data to a hidden log file in the %TEMP% folder.
  7. Data exfiltration: At regular intervals, the encrypted logs are sent to the attacker's Command & Control (C2) server (e.g., 204.10.160.190) via TCP port 7003.

Comprehensive details of kill chain

1. Initial access: Phishing mail (The zip-and-script trap)

In 2025 and 2026, XWorm operators have largely moved away from bulky .EXE attachments, which are easily flagged by modern mail gateways. Instead, they favor a multi-stage delivery designed to exploit user trust and system defaults. During our analysis, we observed the victim receiving a phishing email containing a file named "MFEQuotation Work request for NCSOCSO.zip" as an attachment and other information.

Figure 6: Phishing mail
Figure 6: Phishing mail

2. The JavaScript dropper

If the victim is duped into opening the attachment and its enclosed file, the JS file executes via wscript.exe and attempts to connect to a remote server to download a PowerShell script, which serves as the primary engine for the second stage of the infection.

Figure 7: Javascript file in Email RAR attachment
Figure 7: Javascript file in Email RAR attachment

The JavaScript file contains obfuscated code and junk data. The file also contains instructions to download a PowerShell script and execute it using special flags like “-nop -ep bypass.”

Figure 8: IOC's in Javascript code
Figure 8: IOC's in Javascript code

Upon execution of the Javascript file, it is performing network activity for downloading a malicious PowerShell script from hxxps[://]kolanga[.]cc/devils/ENCRYPTEDX[.]ps1.

At the time of publication, the download of hxxps[://]kolanga[.]cc/devils/ENCRYPTEDX[.]ps1 is still available. The threat actor is active and potentially infecting additional machines.

Figure 9: Secondary payload URL
Figure 9: Secondary payload URL

Figure 10: Wscript.exe is utilized to download a malicious PowerShell script from
      URL
Figure 10: Wscript.exe is utilized to download a malicious PowerShell script from URL

Following a successful connection, wscript.exe downloads the malicious PowerShell script and stores it in the "C:\Temp" directory before execution:

Figure 11: Process activity observed upon JS file execution
Figure 11: Process activity observed upon JS file execution

3. Encrypted PowerShell staging

The downloaded PowerShell isn't just a script—it's a secure container.

  • Encryption: The script contains a large block of encrypted data and a hardcoded decryption key.
  • Instructional logic: Once decrypted, it carries instructions to target a legitimate system binary (Aspnet_compiler.exe).
  • DLL reflective loading: Powershell also prepares a DLL payload in memory:
Figure 12: Powershell Script with encrypted data and key
Figure 12: Powershell Script with encrypted data and key

4. Living-off-the-Land: Abusing Aspnet_compiler.exe

In the next stage, the downloaded PowerShell script in the C:\Temp folder will be executed using execution parameters “-nop -ep bypass”. To stay "Silent," the PowerShell script launches the legitimate Microsoft utility:

“C:\Windows\Microsoft.NET\Framework\v4.0.30319\Aspnet_compiler.exe”

As this is a trusted Windows process, most security tools will let it run. The PowerShell script then performs Reflective DLL Injection, carving out space in the memory of the Aspnet_compiler.exe process and then inserting the malicious XWorm DLL directly.

Figure 13: Persistence though file and registry activity
Figure 13: Persistence though file and registry activity

Dissecting the PowerShell script

The decrypted PowerShell script listed below confirms the malicious DLL loads the final payload:

Figure 14: Decrypted Powershell commands contain instructions to perform
      reflective dll loading
Figure 14: Decrypted Powershell commands contain instructions to perform reflective dll loading

The helper DLL is stored in a variable called “$decodedAssemblyBytes” during decryption:

Figure 15: Identifying the helper DLL file and xwormclient payload in PowerShell
      scrip
Figure 15: Identifying the helper DLL file and xwormclient payload in PowerShell script

After applying a series of de-obfuscation and cleaning steps, the following strings in the helper DLL file can be seen:

Figure 16: Deobfuscated helper DLL used to inject xwormclient payload
Figure 16: Deobfuscated helper DLL used to inject xwormclient payload

API’s found in the helper DLL file confirm that the DLL is used to inject the malicious XWorm payload to Aspnet_compiler.exe

Following the reconstruction of the core XWorm v7.1 payload from raw data, our analysis reveals a sophisticated .NET-developed component engineered for stealth and persistence. This payload is equipped with dedicated logic to conduct environmental fingerprinting, utilizing WMI queries such as SELECT * FROM AntiVirusProduct and SELECT * FROM Win32_VideoController to verify the host’s hardware profile and security posture. Furthermore, it features a robust cryptographic suite employing hardcoded AES keys to secure outbound exfiltration and decrypt incoming Command-and-Control (C2) instructions. The integration of the AES-256 algorithm effectively masks malicious activities from standard network-based detection systems.

Figure 17: Dissecting xwormclient payload
Figure 17: Dissecting xwormclient payload

5. In-memory execution & keylogging

XWorm version 7.1 payload is used with helper DLL for this attack. The decrypted malicious payload is not stored on disk and runs entirely in the memory space of the compiler. This payload performs Anti-Virus checks using  “SELECT * FROM AntiVirusProduct” and Anti-VM checks using “SELECT * FROM Win32_VideoController”. Although the XWorm payload used in the attack is not fully equipped with plugins, it is capable of performing data capturing through keystrokes, modifying the \drivers\etc\hosts files, encrypting and decrypting using the AES algorithm, initiating and stopping DDOS attacks, downloading and executing files, logging, and is capable of logging off, restarting, and shutting down the victim machine.

The primary goal of the malware is keylogging. The malware records every keystroke and saves the data to a hidden log file in the %TEMP% folder.

The following image contains strings of the legitimate Aspnet_compiler.exe file:

Figure 18: Image strings of aspnet_compiler.exe
Figure 18: Image strings of aspnet_compiler.exe

The following image lists the malicious strings in memory of Aspnet_compiler.exe after Reflective dll injection:

Figure 19: Memory strings of aspnet_compiler.exe injected with XWormClient
      payload
Figure 19: Memory strings of aspnet_compiler.exe injected with XWormClient payload

Figure 20: Memory Strings after injecting xwormclient payload via helper
      dll
Figure 20: Memory Strings after injecting xwormclient payload via helper dll

The following image shows the AES key and XWorm version used in the attack:

Figure 21: Memory strings reveal the AES Key and XWorm Version
Figure 21: Memory strings reveal the AES Key and XWorm Version

Figure 22: A Google search corroborated the AES Keys correlation with
      XWorm.
Figure 22: A Google search corroborated the AES Keys correlation with XWorm.

6. Persistence mechanism (Managing registry-based persistence)

Aspnet_compiler.exe is renamed to XWormClient.exe and is used as a host process during persistence through the Windows Run registry key:

Figure 23: Persistence though Registry Keys
Figure 23: Persistence though Registry Keys

Abusing Microsoft binaries

We can see the file in the location ‘C:\Users\win10x64\AppData\Roaming\XWormClient.exe’ is actually a legitimate Microsoft file which was earlier present in 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\Aspnet_compiler.exe'

Figure 24: aspnet_compiler.exe is copied to the %appdata/Roaming% folder and
      renamed
Figure 24: aspnet_compiler.exe is copied to the %appdata/Roaming% folder and renamed

Figure 25: Confirming the dropped file is clean aspnet_compiler.exe
Figure 25: Confirming the dropped file is clean aspnet_compiler.exe

7. Data exfiltration

The malware logs user keystroke activity in a log file in the %temp% folder

Figure 26: Keylogging activity of XWorm
Figure 26: Keylogging activity of XWorm

Finally, the malware encrypts the collected log file and sends it back to the attacker's Command & Control (C2) server at specified time intervals. We have seen port 7003 used for this process via the TCP protocol.

  • C2 IP address: 204.10.160.190
  • Network tactic: The data is exfiltrated via an encrypted channel to prevent Network Intrusion Detection Systems (NIDS) from seeing the raw passwords or sensitive data being stolen.
Figure 27: A TCP connection is initiated for data exfiltration
Figure 27: A TCP connection is initiated for data exfiltration

8. Hunting the malware infrastructure

When analysing the IP address used for data exfiltration, we found the same IP address associated with other malware campaigns and different malware families.

Figure 28: Command and Control IP address in active state
Figure 28: Command and Control IP address in active state

Figure 29: The IP address used in this campaign is associated with other malware
      campaigns
Figure 29: The IP address used in this campaign is associated with other malware campaigns

XWorm v7.1 Plugins: 

Post-exploitation modules: Assessing post-compromise tools

  • Monitoring of files, registry, screen, web browser tabs, WebCam and microphone
  • Modify processes, services, startup, and clipboard managers
  • Password stealer
  • DDOS Attack
  • Power on and off 
  • UAC bypass
  • Commands and file execution
  • Install programs 
  • Anti-decompile (Dnspy, .Net Reflector, DotPee)
  • TCP connections

Conclusion

XWorm’s emergence as a top-tier global threat represents a fundamental shift in the cybercrime economy. With the release of Version 7.1, the malware has transcended its "script-kiddie" origins, demonstrating that modern commodity tools now integrate APT-level deceptive tactics. By pivoting from predictable file-based execution to memory-resident, "Living off the Land" (LOTL) techniques, XWorm effectively neutralizes signature-reliant defenses. The strategic abuse of legitimate utilities—such as Aspnet_compiler.exe—combined with reflective DLL injection, enables attackers to remain invisible to legacy security stacks. Furthermore, by weaponizing trusted platforms like Discord and exploiting critical vulnerabilities such as CVE-2025-8088 (WinRAR), XWorm has successfully bridged the gap between low-cost accessibility and high-impact enterprise disruption. For security leaders, the "commodity" label no longer implies simplicity; it now signifies a highly optimized, modular, and relentlessly evolving adversary.

XWorm’s rapid ascent to the #3 global threat ranking necessitates an immediate transition toward a proactive, behavior-based security posture. Resilience against this modular threat is predicated on the following technical pillars:

  • The human layer remains the most exploited attack surface — treat it accordingly: Phishing remains the preeminent vector for initial access in modern cyber-operations. Given that XWorm’s delivery mechanism exploits sophisticated, business-contextualized social engineering—exemplified by the "MFEQuotation" lure—organizations must transcend traditional, compliance-mandated awareness training. Personnel should be conditioned to maintain a posture of heightened scrutiny toward compressed or encrypted attachments, irrespective of the perceived legitimacy of the sender’s corporate identity.
  • Upstream threat interdiction: Deploy high-fidelity mail and web filtering to intercept malicious ZIP/RAR stagers. Particular attention must be paid to the remediation of CVE-2025-8088, which serves as a critical entry point for path-traversal-based deliveries.
  • Advanced behavioral detection: Beyond signature-based prevention, EDR must be tuned to alert on the "Living off the Land" (LotL) tactics identified in the 7.1 kill chain. Focus on process hollowing and credential-theft functions initiated by legitimate .NET binaries.
  • Accelerated vulnerability lifecycle management for peripheral software: The weaponization of path-traversal vulnerabilities, such as CVE-2025-8088, underscores the acute risk profile of "N-day" exploits targeting ubiquitous third-party utilities. Security leadership must mandate an expedited patching cadence for archive management software (e.g., WinRAR 7.13+) and other peripheral applications that frequently reside outside the scope of automated enterprise patching workflows. Strengthening the governance of this software tier is critical to preventing adversaries from exploiting the "patch gap" to gain persistent footholds.
  • Exfiltration suppression: Utilize continuous network monitoring to pinpoint the exfiltration of keylogs and stolen credentials. By identifying the specific AES-masked communication patterns on Port 7003, organizations can significantly reduce the "dwell time" of the XWorm agent.

To mitigate the risks posed by modular threats like XWorm, Trellix employs a multi-layered defensive strategy that secures the enterprise perimeter and internal assets alike. This orchestrated approach utilizes Trellix Email Security to thwart initial delivery, while Trellix EDR and Trellix Endpoint Security (ENS/HX) provide deep-visibility detection of obfuscated command execution and persistence mechanisms. Visibility into the command-and-control (C2) stage is maintained through specialized network and cloud security modules, supported by the MVX engine for the isolated analysis of evasive samples. By synthesizing data from disparate vectors through an AI-enhanced correlation engine, Trellix bridges the gap between isolated alerts and a unified view of the adversary lifecycle. This intelligence-led framework ensures that security teams can outpace the rapid evolution of global threats, shifting the paradigm from simple detection to durable resilience.

Indicators of Compromise (IOCs)

FileType Name SHA256
Email Temp[82].eml c6739ae299cde3ba604886f86df328ecdeb5ddad440d05b22b71580483a358b3 
ZIP MFESEK3180110RA - MFEQuotation Work request for NCSOCSO.zip a699b2b370023fe9a77e6297fae942271debdc8f2a6589f701e5cc84239f2446
JavaScript MFESEK3180110RA - MFEQuotation Work request for NCSOCSO.js 2310a8c9c8c8d27053e63afc6ab66e1b2143e36c9e347368850eab5ba7b9dacf
PowerShell ENCRYPTEDX.ps1 ef0d5541ec1405bc5d383754ac546b51e2a389bcb14c7ddbe37c2225fcf050b6
Helper DLL Mafia.dll 3e7d97d4896130e2150f79e685dde01f26ed2f0882b9829b385b142c982c9176
Payload XWormClient.exe 3ce1c96dd324e2485328c23eaa9d4bb17a7ee14d06f73de899d5bede07ffb3f1

URL hxxps[://]kolanga[.]cc/devils/ENCRYPTEDX[.]ps1
IP Address and Port tcp://204[.]10[.]160[.]190:7003
Mutex uUDkTzshM7rT3NdQ
AES Key <V7PV7PV7PV7PV7P>

Trellix Detection coverage

Product Detections
Trellix Endpoint Security (ENS) JS/Downloader.jar Trojan-JARM!E4DB390D4E3A
Trojan-FWBP!7D273DB94231
Trellix Endpoint Security (HX) Trojan.Generic.39452305
Trojan.GenericKDS.61382503
Trojan.GenericKDS.61382503
Gen:Variant.Application.Tedy.52869
Trojan.Generic.39454977
Generic.mg.7d273db94231ebe5
Trellix Network Security
Trellix VX
Trellix Cloud MVX
Trellix Malware Analysis
Trellix Email Security
Trellix Detection As A Service
Trellix NX
Trojan.JS.Heuristic
Trojan.Win32.Kepavll
Trojan.Generic
FE_Backdoor_MSIL_XWORM_
Malicious.LIVE.DTI.URL
Trellix EDR

Wrote PE header into remote process (PE file DOS header) [T1106 T1055.002 T1620]

runtimebroker.exe has been executed by an unusual process [T1059.003]

Suspicious Process Execution (File Creation + Autorun entry) [T1547.001 T1105]

Browsed suspicious domain weblink [T1566.002 T1204.001]

Suspicious process created a file at a commonly abused path [T1105]

Persistence (file to startup or run keys in registry) [T1547]

Startup entry registered through services execution [T1547.001 T1112]

External network connection was initiated via COM API [T1071 T1559.001]

Performed native API call used to capture keyboard input [T1106 T1056.001 T1056.004]

Process hollowed [T1106 T1055.012]

Modified registry run keys under suspicious context [T1547.001  T1112]

Deleted directory in quiet mode [T1070.004 T1485]

Added content to registry executed at next Windows logon [T1547.001 T1112]

Removed file from the system via Command-Line utility DEL command [T1059.003 T1070.004]

IP and URL Trellix coverage

URL Trellix coverage
hxxps[://]kolanga[.]cc/devils/ENCRYPTEDX[.]ps1 High Risk Malicious Sites Phishing PUPs (potentially unwanted programs)

C2 server IP Trellix coverage
204[.]10[.]160[.]190 Medium-Risk  PUPs (potentially unwanted programs)

References:

  • https://any.run/malware-trends/
  • https://medium.com/@anyrun/malware-trends-overview-report-2025-8aba11baacd3
  • https://www.cloudsek.com/blog/no-honour-among-thieves-uncovering-a-trojanized-xworm-rat-builder-propagated-by-threat-actors-and-disrupting-its-operations
  • https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability

Discover the latest cybersecurity research from the Trellix Advanced Research Center: https://www.trellix.com/advanced-research-center/

This document and the information contained herein describes computer security research for educational purposes only and the convenience of Trellix customers.

Get the latest

Stay up to date with the latest cybersecurity trends, best practices, security vulnerabilities, and so much more.
Please enter a valid email address.

Zero spam. Unsubscribe at any time.