JScript to PowerShell: Breaking Down a Loader Delivering XWorm and Rhadamanthys
This analysis examines a sophisticated malware loader that utilizes JScript to launch obfuscated PowerShell code, ultimately delivering payloads such as XWorm and Rhadamanthys. The loader employs geofencing tactics, targeting victims in the United States with XWorm RAT, while deploying Rhadamanthys stealer to users outside the U.S. The attack chain involves multiple stages of obfuscation and deobfuscation, including decimal encoding and string manipulation. The final payload is injected into RegSvcs.exe using reflective loading techniques. The loader also performs various cleanup actions to evade detection and remove traces of its activity. Both XWorm and Rhadamanthys are advanced malware variants with capabilities ranging from DDoS attacks to cryptocurrency theft.
AI Analysis
Technical Summary
This threat involves a sophisticated multi-stage malware loader that leverages JScript to execute obfuscated PowerShell code, ultimately delivering two distinct malware payloads: XWorm and Rhadamanthys. The loader employs advanced obfuscation techniques including decimal encoding and complex string manipulation to evade detection and analysis. It uses geofencing logic to differentiate targets based on geographic location: victims within the United States are infected with the XWorm Remote Access Trojan (RAT), while those outside the U.S. receive the Rhadamanthys stealer malware. The final payload is injected into the legitimate Windows process RegSvcs.exe via reflective loading, a technique that allows the malware to execute in memory without touching the disk, thereby reducing forensic footprints. Post-infection, the loader performs cleanup routines to remove traces of its activity, further complicating detection and incident response efforts. XWorm is known for its capabilities including remote control, DDoS attacks, and credential theft, whereas Rhadamanthys specializes in stealing sensitive information such as cryptocurrency wallets and credentials. The attack chain’s reliance on JScript and PowerShell highlights exploitation of native Windows scripting environments, which are often trusted and less scrutinized by security controls. Indicators of compromise include specific file hashes and malicious domains hosted on blogspot.com, which are used as command and control or payload distribution points. Although no known exploits in the wild have been reported at the time of analysis, the medium severity rating reflects the malware’s potential impact and sophistication.
Potential Impact
For European organizations, the primary risk stems from the Rhadamanthys stealer payload, as the loader’s geofencing excludes U.S. targets from receiving XWorm. Rhadamanthys’ capability to exfiltrate sensitive data, particularly cryptocurrency wallets and credentials, poses a significant threat to financial institutions, cryptocurrency exchanges, and enterprises handling sensitive personal or financial information. The use of reflective loading and multi-layer obfuscation complicates detection by traditional antivirus and endpoint detection and response (EDR) solutions, increasing the likelihood of prolonged undetected presence. This can lead to data breaches, financial loss, and reputational damage. Additionally, the malware’s use of legitimate Windows processes for payload execution can bypass application whitelisting and behavioral detection mechanisms. European organizations with remote workforces or those that rely heavily on PowerShell scripting for automation may be particularly vulnerable if security controls are not properly configured. The threat also underscores the risk of supply chain or phishing attacks that deliver JScript loaders, emphasizing the need for robust email and web security. While the direct DDoS capabilities of XWorm are less relevant for Europe due to geofencing, the data theft and espionage potential of Rhadamanthys remain critical concerns.
Mitigation Recommendations
To mitigate this threat, European organizations should implement the following specific measures: 1) Enforce strict PowerShell logging and enable script block logging to detect obfuscated or suspicious PowerShell activity. 2) Deploy application control policies to restrict execution of JScript and PowerShell scripts from non-standard locations, especially user profile directories and temporary folders. 3) Monitor and block known malicious domains such as those identified (e.g., allhoteldirectlunk.blogspot.com, 7000linknewembes.blogspot.com) via DNS filtering and firewall rules. 4) Use endpoint detection tools capable of detecting reflective DLL injection and anomalous process behavior, focusing on legitimate Windows processes like RegSvcs.exe. 5) Harden email gateways with advanced phishing detection and sandboxing to prevent delivery of malicious JScript loaders. 6) Conduct regular threat hunting exercises focusing on indicators of compromise including the provided hashes. 7) Educate users about the risks of enabling macros or running scripts from untrusted sources. 8) Implement network segmentation to limit lateral movement if infection occurs. 9) Keep all systems and security solutions updated to leverage the latest detection signatures and heuristics. These targeted actions go beyond generic advice by focusing on the specific attack vectors and techniques used by this loader and its payloads.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Poland, Italy, Spain
Indicators of Compromise
- hash: 70c52b2dac24420378afbb59e1f4705c8b0e521523280e29f48140a98fdd07bb
- hash: b5b4359ee5a79b06b388cebabb9fa2faabd4d920a10563947a0e5c5f94056bda
- hash: ba259ee618d3514db28b407a9aad22347f3473f2539153cdadb407f5c59745a1
- domain: allhoteldirectlunk.blogspot.com
- domain: 7000linknewembes.blogspot.com
JScript to PowerShell: Breaking Down a Loader Delivering XWorm and Rhadamanthys
Description
This analysis examines a sophisticated malware loader that utilizes JScript to launch obfuscated PowerShell code, ultimately delivering payloads such as XWorm and Rhadamanthys. The loader employs geofencing tactics, targeting victims in the United States with XWorm RAT, while deploying Rhadamanthys stealer to users outside the U.S. The attack chain involves multiple stages of obfuscation and deobfuscation, including decimal encoding and string manipulation. The final payload is injected into RegSvcs.exe using reflective loading techniques. The loader also performs various cleanup actions to evade detection and remove traces of its activity. Both XWorm and Rhadamanthys are advanced malware variants with capabilities ranging from DDoS attacks to cryptocurrency theft.
AI-Powered Analysis
Technical Analysis
This threat involves a sophisticated multi-stage malware loader that leverages JScript to execute obfuscated PowerShell code, ultimately delivering two distinct malware payloads: XWorm and Rhadamanthys. The loader employs advanced obfuscation techniques including decimal encoding and complex string manipulation to evade detection and analysis. It uses geofencing logic to differentiate targets based on geographic location: victims within the United States are infected with the XWorm Remote Access Trojan (RAT), while those outside the U.S. receive the Rhadamanthys stealer malware. The final payload is injected into the legitimate Windows process RegSvcs.exe via reflective loading, a technique that allows the malware to execute in memory without touching the disk, thereby reducing forensic footprints. Post-infection, the loader performs cleanup routines to remove traces of its activity, further complicating detection and incident response efforts. XWorm is known for its capabilities including remote control, DDoS attacks, and credential theft, whereas Rhadamanthys specializes in stealing sensitive information such as cryptocurrency wallets and credentials. The attack chain’s reliance on JScript and PowerShell highlights exploitation of native Windows scripting environments, which are often trusted and less scrutinized by security controls. Indicators of compromise include specific file hashes and malicious domains hosted on blogspot.com, which are used as command and control or payload distribution points. Although no known exploits in the wild have been reported at the time of analysis, the medium severity rating reflects the malware’s potential impact and sophistication.
Potential Impact
For European organizations, the primary risk stems from the Rhadamanthys stealer payload, as the loader’s geofencing excludes U.S. targets from receiving XWorm. Rhadamanthys’ capability to exfiltrate sensitive data, particularly cryptocurrency wallets and credentials, poses a significant threat to financial institutions, cryptocurrency exchanges, and enterprises handling sensitive personal or financial information. The use of reflective loading and multi-layer obfuscation complicates detection by traditional antivirus and endpoint detection and response (EDR) solutions, increasing the likelihood of prolonged undetected presence. This can lead to data breaches, financial loss, and reputational damage. Additionally, the malware’s use of legitimate Windows processes for payload execution can bypass application whitelisting and behavioral detection mechanisms. European organizations with remote workforces or those that rely heavily on PowerShell scripting for automation may be particularly vulnerable if security controls are not properly configured. The threat also underscores the risk of supply chain or phishing attacks that deliver JScript loaders, emphasizing the need for robust email and web security. While the direct DDoS capabilities of XWorm are less relevant for Europe due to geofencing, the data theft and espionage potential of Rhadamanthys remain critical concerns.
Mitigation Recommendations
To mitigate this threat, European organizations should implement the following specific measures: 1) Enforce strict PowerShell logging and enable script block logging to detect obfuscated or suspicious PowerShell activity. 2) Deploy application control policies to restrict execution of JScript and PowerShell scripts from non-standard locations, especially user profile directories and temporary folders. 3) Monitor and block known malicious domains such as those identified (e.g., allhoteldirectlunk.blogspot.com, 7000linknewembes.blogspot.com) via DNS filtering and firewall rules. 4) Use endpoint detection tools capable of detecting reflective DLL injection and anomalous process behavior, focusing on legitimate Windows processes like RegSvcs.exe. 5) Harden email gateways with advanced phishing detection and sandboxing to prevent delivery of malicious JScript loaders. 6) Conduct regular threat hunting exercises focusing on indicators of compromise including the provided hashes. 7) Educate users about the risks of enabling macros or running scripts from untrusted sources. 8) Implement network segmentation to limit lateral movement if infection occurs. 9) Keep all systems and security solutions updated to leverage the latest detection signatures and heuristics. These targeted actions go beyond generic advice by focusing on the specific attack vectors and techniques used by this loader and its payloads.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://medium.com/@andrew.petrus/jscript-to-powershell-breaking-down-a-loader-delivering-xworm-and-rhadamanthys-bf59dffb609b"]
- Adversary
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash70c52b2dac24420378afbb59e1f4705c8b0e521523280e29f48140a98fdd07bb | — | |
hashb5b4359ee5a79b06b388cebabb9fa2faabd4d920a10563947a0e5c5f94056bda | — | |
hashba259ee618d3514db28b407a9aad22347f3473f2539153cdadb407f5c59745a1 | — |
Domain
Value | Description | Copy |
---|---|---|
domainallhoteldirectlunk.blogspot.com | — | |
domain7000linknewembes.blogspot.com | — |
Threat ID: 682c992c7960f6956616a5f7
Added to database: 5/20/2025, 3:01:00 PM
Last enriched: 6/19/2025, 6:05:45 PM
Last updated: 7/26/2025, 1:21:08 PM
Views: 12
Related Threats
From ClickFix to Command: A Full PowerShell Attack Chain
MediumNorth Korean Group ScarCruft Expands From Spying to Ransomware Attacks
MediumMedusaLocker ransomware group is looking for pentesters
MediumThreatFox IOCs for 2025-08-10
MediumThreatFox IOCs for 2025-08-09
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.