Today > | 2 Medium vulnerabilities   -   You can now download lists of IOCs here!

XWorm: Analyzing New Infection Tactics With Old Payload

Dec. 5, 2024, 9:54 a.m.

Description

A recent malware campaign utilizes a multi-stage infection chain starting with a LNK file that lures victims into opening an invoice in a web browser. The attack involves PowerShell commands, batch files, and Python scripts to download and execute the XWorm payload. The infection process includes downloading a ZIP file containing Python setup files and scripts, with a malicious script responsible for decrypting and injecting shellcode. The XWorm variant employed is an older version that includes an Xlogger module for tracking user activities. The malware's capabilities include shellcode injection and keylogging, enabling the theft of sensitive information and exfiltration to a remote server.

Date

Published: Dec. 4, 2024, 5 p.m.

Created: Dec. 4, 2024, 5 p.m.

Modified: Dec. 5, 2024, 9:54 a.m.

Attack Patterns

XWorm

T1059.005

T1055.002

T1113

T1071.001

T1592

T1027

T1056