Unmasking XWorm: A Dive into the New Malware Kid on the Block

SIDDARDA GOWTHAM JAGABATHINA
3 min readSep 19, 2023

--

Hey there, folks! Today, we’re delving into the world of cybersecurity, where a fresh troublemaker named XWorm has been causing quite a ruckus. This digital troublemaker is a remote access trojan (RAT) that’s been giving experts a run for their money since it first popped up on their radar in 2022. Let’s roll up our sleeves and see what makes this malware tick. Our story begins when some eagle-eyed analysts at ANY.RUN stumbled upon a sample of XWorm in their treasure trove of malware data. This collection houses detailed reports on all sorts of suspicious files and links uploaded by users. This particular troublemaker started its journey on MediaFire, tucked away in a password-protected RAR archive.

XWorm isn’t your average computer bug; it’s got some nifty moves up its digital sleeves:

  1. Startup Shortcut: XWorm pulls a slick move by adding itself to the Startup directory. It’s like a gatecrasher that shows up every time your computer throws a party.
  2. Task Scheduler Tango: To give itself a VIP pass, XWorm plays around with the task scheduler. Think of it as sneaking into the best parties in town.
  3. Public Domain Dwelling: This malware isn’t shy about making itself at home in the Public directory.
  4. Silent Phone Call: XWorm tries to phone home to a distant server, but it often gets the cold shoulder.

Now, here’s where it gets interesting. XWorm isn’t a pushover; it knows how to dodge those pesky sandboxes. When it senses it’s in a virtual playground, it shuts down quicker than you can say “malware.” But the ANY. The RUN team had a trick up their sleeves — they used a Residential Proxy to make the malware believe it was in the real world, not some digital sandbox. Sneaky, right? To understand XWorm better, the experts had to get their hands dirty. They started by poking around in the code using a tool called Detect it Easy (DIE). DIE showed them that this version of XWorm is like a .NET sibling. But things got a bit murky when they discovered that the code was heavily disguised. Even DIE’s fancy tricks couldn’t uncover the hidden secrets. They even tried a tool called de4dot, but it was a no-go.

The experts weren’t giving up. They kept digging and found that XWorm was no ordinary troublemaker. It had a few tricks up its sleeve:

  1. Virtual World Spy: XWorm checked if it was playing in a virtual sandbox or on a real computer. Smart move, right?
  2. Debugger Detect: It even peeked around to see if someone was snooping on its secrets with a debugger.
  3. Sandboxie Sherlock: XWorm had a knack for spotting if it was being observed in a Sandboxie environment.
  4. Datacenter Dilemma: It also sniffed around to see if it was in a data center.

XWorm didn’t want to be a one-time thing; it wanted to stick around. So, it used the registry and the task scheduler to make itself at home on the infected system. The researchers stumbled upon something interesting — a set of settings. They tinkered with these settings and uncovered some crucial info. They found out about the malware’s secret communication channels, encryption keys, and even the Telegram token it was using.

In the world of cybersecurity, knowing your enemy is half the battle. XWorm might be a sneaky one, but with determined folks and the right tools like ANY.RUN’s sandbox, even the craftiest malware can’t hide forever. Remember, in the digital jungle, knowledge is your best weapon against these ever-evolving threats.

--

--

SIDDARDA GOWTHAM JAGABATHINA
SIDDARDA GOWTHAM JAGABATHINA

Written by SIDDARDA GOWTHAM JAGABATHINA

Passionate about cybersecurity and eager to share the knowledge I have gained and continue to acquire to educate the world.

No responses yet