Abusing Paste.ee to Deploy XWorm and AsyncRAT Across Global C2 Infrastructure
June 8, 2025, 4:47 p.m.
Description
A sophisticated malware campaign has been discovered utilizing paste.ee to distribute XWorm and AsyncRAT. The attackers employ obfuscated JavaScript with Unicode characters to download and execute malicious code from paste.ee URLs. The infrastructure includes multiple C2 servers across Europe and the US, using specific ports and SSL certificates. XWorm, a stealthy RAT, captures keystrokes, exfiltrates data, and maintains persistent remote access. AsyncRAT, an open-source trojan, is also part of the campaign. The attackers use a network of IP addresses and domains, with some hosted by QuadraNet Enterprises LLC and dataforest GmbH. Defenders are advised to block identified domains, monitor suspicious connections, and update security software to detect unusual behavior.
Tags
Date
- Created: June 6, 2025, 11:02 a.m.
- Published: June 6, 2025, 11:02 a.m.
- Modified: June 8, 2025, 4:47 p.m.
Indicators
- dfd0913df9c133d00a71ffe4410046e5e3bb4487b6052c39c055f6f93fe1cf31
- 8da7da34b7fa3b6585200c9ea46cbefe39b31ff5f1e1b26f59bd0bc3cc4f9dc4
- 66.63.187.232
- 45.145.43.244
- 66.63.187.154
- 196.251.118.41
- abuwire123.duckdns.org
- abuwire123.ddns.net
- passte.ee
- carosnews.com
- abuwire123h.ddns.net
- itns.net
Additional Informations
- 45.145.43.0/24
- Germany
- United States of America