DarkCrystal RAT aka DCRat – Active IOCs
July 7, 2025Linux Boot Flaw Enables Secure Boot Bypass
July 7, 2025DarkCrystal RAT aka DCRat – Active IOCs
July 7, 2025Linux Boot Flaw Enables Secure Boot Bypass
July 7, 2025Severity
High
Analysis Summary
XWorm has solidified its place as one of the most dangerous and flexible remote access trojans (RATs) currently active in the threat landscape. Unlike traditional RATs, XWorm provides attackers with an extensive suite of capabilities, including keylogging, remote desktop access, command execution, and data exfiltration, allowing full control over compromised systems. What distinguishes XWorm is not only its technical depth but also its versatility in evading modern security solutions, making it highly attractive to cybercriminals. It is frequently seen in campaigns targeting high-value sectors such as the software supply chain and the gaming industry, often as a precursor to ransomware attacks involving LockBit Black builder tools.
According to the Researcher, the critical strength of XWorm lies in its delivery flexibility. It avoids relying on a fixed infection method and instead cycles through various scripting languages and file types, including PowerShell, JavaScript, VBS, .NET executables, batch scripts, and Office macros. This polymorphic behavior helps it bypass endpoint detection and sandbox analysis. Phishing remains the primary infection vector, with attackers using convincing lures like fake invoices, receipts, and delivery messages to trick victims into opening malicious attachments. Analysis of over 1,000 samples from Malware Bazaar confirms that this approach remains highly effective in social engineering campaigns.
XWorm demonstrates an advanced level of system-level evasion. One of its most dangerous traits is the capability to disable the Windows Antimalware Scan Interface (AMSI), specifically by patching the AmsiScanBuffer() function within the amsi.dll library to prevent in-memory script scanning. Additionally, it targets Event Tracing for Windows (ETW), patching the EtwEventWrite() function to blind security tools from logging malicious behavior. This dual approach to defense evasion, disabling both AMSI and ETW, illustrates a deliberate strategy to undermine built-in Windows security mechanisms and delay detection.
For persistence and stealth, XWorm uses a combination of registry run keys and scheduled tasks that reference dropped VBS and batch scripts in the %appdata% directory. Furthermore, it employs process injection into trusted Windows processes like explorer.exe, svchost.exe, and taskmgr.exe, and hooks into multiple Windows APIs to hide its presence. This multi-pronged attack methodology, supported by shellcode injection and runtime obfuscation, makes XWorm a significant challenge for defenders and a notable evolution in modern RAT capabilities. Security teams must adopt behavior-based detection and endpoint monitoring strategies to counteract XWorm's sophisticated threat model.
Impact
- Sensitive Data Theft
- Gain Access
- Security Bypass
Indicators of Compromise
MD5
- 40c6da90679132c7a12f85eed007d9fe
- b76c3c118bfa1f1976b7835a010b7677
- 64a6b0052c926a8e933f96fe545b066c
- a079bacf0f4b075e90db5e2abd89e6b9
- cc3c0e6f75302fb6c2d9b5e7f487efe8
SHA-256
- 78b15b9b54925120b713a52a09c66674463bd689e3b01395801ef58c77651127
- 0f10d6cbaf195a7b0c9f708b7f0a225e2de29beb769bdf8d1652b682b1c4679f
- 9db47f709898b79c9ac07e6352de9be05d6b2b91902c146272e47c17c6b8d5b2
- 8044220d34e77501df4a9831ac27802261ea2309f104bb49ac00301df36dee72
- 354d082858bfc5e24133854ff14bb2e89bc16e1b010b9d3372c8370d3144cdb9
SHA1
- 2c3fd2658e3b8f726d038ae8a954aca3ae6cac50
- 70bdb6ff2f40190a8bd9a023cb18c0177fb873cf
- a21b278f70535a35bf5ed40654cf448b5f1e6d96
- 2fe5a43eb1733941726749969c7645f5f644d11b
- aa94427fcc50b727fa22914292ea5c95755823d9
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Implement application whitelisting to block unauthorized script execution such as PowerShell, VBS, and JavaScript.
- Regularly verify the integrity of AMSI and ETW to detect memory tampering or patching attempts.
- Deploy advanced email filters and anti-phishing tools to prevent malicious attachments and links from reaching users.
- Use behavior-based endpoint detection and response (EDR) solutions to identify process injection, API hooking, and unusual system behavior.
- Monitor and clean commonly abused directories like %appdata% and Temp folders where malware scripts are often stored.
- Continuously audit scheduled tasks and registry run keys to detect and remove unauthorized persistence mechanisms.
- Keep Windows operating systems, security software, and applications fully patched and updated to prevent exploitation.
- Inspect outbound network traffic for suspicious connections or data exfiltration, especially beaconing to unknown domains.
- Enforce the principle of least privilege by limiting user accounts from having unnecessary administrative access.