New XWorm V6 Variant Infected Windows Applications with Malicious Code

0
XWorm V6 Malware Variant Infects Windows Applications with Malicious Code

“Trusted Windows Applications are being affected by a malicious code via the latest XWorm V6 variant.”

Being informed is not only advantageous in the ever-changing world of cyber threats but also essential. When XWorm was first discovered in 2022, it immediately became known as a very potent piece of malware that gave hackers a wide range of tools to use for their nefarious purposes.

The foundation of XWorm’s modular architecture is a core client and a variety of specialized parts called plugins. In essence, these plugins are extra payloads meant to perform particular destructive tasks as soon as the main virus is activated.

Because of its versatility, attackers can exploit XWorm’s capabilities for a variety of goals, from constant monitoring to data theft and system control.

Comprehending these plugins is essential for cybersecurity experts protecting their companies, as well as cybersecurity product users looking to strengthen their defenses against such common dangers.

Image Shows XWorm

Trellix ARC has kept a careful eye on XWorm’s development, including its most recent comeback. In this article, we’ll delve further to examine a campaign that uses XWorm V6.0 and, more crucially, analyze the main plugins and extra payloads, such as a persistence script.

From Desertion to Anarchy

Regular updates on XWorm’s development, spearheaded by “XCoder,” were disseminated via Telegram. Following the release of XWorm V5.6 in late 2024, XCoder terminated official support and left V5.6 as the version that was thought to be final.

Threat actors subsequently disseminated V5 cracks. Six builders were infected by trojans that unintentionally affected operators. CloudSEK and DMPdump have reported trojanized builders and altered distributions, while XSPY, a Chinese-language variant, has surfaced.

Another setback was the discovery of a serious remote code execution flaw in V5.6 that allowed attackers to run arbitrary code using the C2 encryption key—an exploit that was confirmed in labs.

Many experts shifted their focus elsewhere after concluding that XWorm was no longer a threat, but malware retirement is rarely permanent.

“XCoderTools” posted an announcement of XWorm V6.0 on hackforums.net on June 4, 2025, claiming improvements and solutions for the RCE vulnerability.

There was a lot of doubt: was XCoderTools the real author, or was it just a shady character taking advantage of XWorm’s good name? Operators were forced to mirror on Signal after two Telegram channels, one for updates and the other for discussion, surfaced but were continually banned.

Image Shows V6 variant

The authenticity of V6.0 is still being questioned, despite community videos showcasing new features. VirusTotal detections of XWorm V6.0 have increased since its release, highlighting the threat actors’ quick uptake.

Plugin Arsenal and Infection Chain

A well-known V6.0 campaign starts with a malicious JavaScript file that displays a harmless PDF decoy and downloads and runs a PowerShell script.

Image Shows Windows Applications

RemoteDesktop.dll, Stealer.dll, FileManager.dll, Shell.dll, and ransomware.dll are notable payloads. The latter drops ransom notes and wallpapers, encrypts files using AES-CBC keyed by a SHA-512 hash of the client ID, and sets registry flags to monitor the encryption status.

This technique is mirrored in decryption. With further modules enabling rootkit installation and factory-reset persistence in leaked V6.4 builds, V6 has more than 35 plugins.

Persistence and Changing Danger

To withstand reinstalls, persistence scripts that are distributed as VBS or .wsf files generate registry run keys, scheduled tasks, and even ResetConfig.xml for push-button resets.

From admin-level factory reset hooks to logon scripts, operators use four different persistence techniques.

A self-propagating issue wherein builders themselves host malware is shown by the fact that cracked V6 builders further spread infected builders.

Image Shows Malicious code

The resurgence of XWorm V6 emphasizes that malware threats never fully go away. Its sophisticated injection tactics and modular plugin architecture necessitate defenses that go beyond signature-based prevention.

A multi-layered posture is necessary, including proactive email and web gateways to stop initial droppers, endpoint detection and response to detect unusual process injections, and ongoing network monitoring to identify C2 communications.

Agile, behavior-focused security technologies are essential in an ever-changing threat landscape to keep one step ahead of adversaries.

IOC

Here is the data presented in tabular form:

SHA256 Name
995869775b9d43adeb7e0eb34462164bcfbee3ecb4eda3c436110bd9b905e7ba OSHA_Investigation_Case_0625OQI685837AW.pdf.js
4ce4dc04639d673f0627afc678819d1a7f4b654445ba518a151b2e80e910a92c payload_1.ps1
8514a434b50879e2b8c56cf3fd35f341e24feae5290fa530cc30fae984b0e16c ClassLibrary7.dll
570e4d52b259b460aa17e8e286be64d5bada804bd4757c2475c0e34a73aeb869 XWormClient.exe
000185a17254cd8863208d3828366ec25ddd01596f18e57301355d4a33eac242 RunShell.exe
4d225af71d287f1264f3116075386ac2ce9ee9cd26fb8c3a938c2bf50cca8683 000053AB01136548.wsf
760a3d23ee860cf2686a3d0ef266e7e1ad835cc8b8ce69bfe68765c247753c6b 00001EF600EEBD20.wsf
8106b563e19c946bd76de7d00f7084f3fc3b435ed07eb4757c8da94c89570864 win32.exe
1990659a28b2c194293f106e98f5c5533fdad91e50fdeb1a9590d6b1d2983ada chrome_decrypt.dll
d46bb31dc93b89d67abffe144c56356167c9e57e3235bfb897eafc30626675bb ChromiumDecryption
f279a3fed5b96214d0e3924eedb85907f44d63c7603b074ea975d1ec2fdde0b4 WindowsUpdate.dll
31376631aec4800de046e1400e948936010d9bbedec91c45ae8013c1b87564d0 RemoteDesktop.dll
5123b066f4b864e83bb14060f473cf5155d863f386577586dd6d2826e20e3988 RemoteDesktop.dll
b314836a3ca831fcb068616510572ac32e137ad31ae4b3e506267b429f9129b1 FileManager.dll
5314c7505002cda1e864eced654d132f773722fd621a04ffd84ae9bc0749b791 TCPConnections.dll
33ee1961e302da3abc766480a58c0299b24c6ed8ceeb5803fa857617e37ca96e merged.dll
2b507d3ae01583c8abf4ca0486b918966643159a7c3ee7adb5f36c7bd2e4d70e SystemCheck.Merged.dll
df0096bd57d333ca140331f1c0d54c741a368593a4aac628423ab218b59bd0bb shell.dll
0c2bf36dd9ccb3478c8d3dd7912bcfc1f5d910845446e1adfd1e769490287ab4 Stealer.dll
64cbbbf90fe84eda1a8c2f41a4d37b1d60610e7136a02472a72c28b6acadc2fc Ransomware.dll
6a0c1f70af17bd9258886f997bb43266aa816ff24315050bbf5f0e473d059485 Rootkit.dll
8d04215c281bd7be86f96fd1b24a418ba1c497f5dee3ae1978e4b454b32307a1 ResetSurvival.dll

About The Author

Suraj Koli is a content specialist in technical writing about cybersecurity & information security. He has written many amazing articles related to cybersecurity concepts, with the latest trends in cyber awareness and ethical hacking. Find out more about “Him.”

Read More:

Using FoalShell and StallionRAT, a New “Cavalry Werewolf” Attack Targets Russian Agencies

About Author

Leave a Reply

Your email address will not be published. Required fields are marked *

en_USEnglish
Open chat
Hello
Can we help you?