XWorm: Analyzing New Infection Tactics With Old Payload
Dec. 5, 2024, 9:54 a.m.
Tags
External References
Description
A recent malware campaign utilizes a multi-stage infection chain starting with a LNK file that lures victims into opening an invoice in a web browser. The attack involves PowerShell commands, batch files, and Python scripts to download and execute the XWorm payload. The infection process includes downloading a ZIP file containing Python setup files and scripts, with a malicious script responsible for decrypting and injecting shellcode. The XWorm variant employed is an older version that includes an Xlogger module for tracking user activities. The malware's capabilities include shellcode injection and keylogging, enabling the theft of sensitive information and exfiltration to a remote server.
Date
Published: Dec. 4, 2024, 5 p.m.
Created: Dec. 4, 2024, 5 p.m.
Modified: Dec. 5, 2024, 9:54 a.m.
Attack Patterns
XWorm
T1059.005
T1055.002
T1113
T1071.001
T1592
T1027
T1056