XWorm V6: Exploring Pivotal Plugins
Since the release of XWorm V6.0 on June 4, 2025, we have noted a surge in samples identified as XWorm V6.0 on VirusTotal, reflecting its rapid adoption by threat actors. One prominent campaign illustrates its delivery: a malicious JavaScript (JS) file initiates a PowerShell (PS1) script, which deploys an injector to deliver the XWorm Client.
AI Analysis
Technical Summary
XWorm V6 is a sophisticated remote access Trojan (RAT) that has gained rapid traction among threat actors since its release on June 4, 2025. The malware is primarily delivered through malicious JavaScript files that execute PowerShell scripts, which in turn deploy an injector to install the XWorm client on victim systems. This multi-stage infection chain allows the malware to evade traditional detection mechanisms by leveraging script-based execution and AMSI (Antimalware Scan Interface) bypass techniques. The malware incorporates a range of capabilities including remote desktop access, file management, credential harvesting, and process injection (notably process hollowing and thread injection), enabling attackers to maintain persistent and stealthy control over compromised hosts. The use of PowerShell and JavaScript as delivery and execution vectors aligns with common phishing campaigns, increasing the likelihood of successful initial compromise. The malware’s modular design allows it to load pivotal plugins that extend its functionality, making it adaptable to different operational needs. Although there are no known exploits in the wild targeting specific vulnerabilities, the threat relies heavily on social engineering and script execution to infiltrate environments. The tags associated with the threat (e.g., T1012, T1027, T1036, T1041, T1055, T1056, T1057, T1059) correspond to MITRE ATT&CK techniques such as system information discovery, obfuscated files or information, masquerading, command and control, process injection, input capture, system service discovery, and command-line interface usage, highlighting the malware’s comprehensive attack lifecycle. The absence of affected versions and patch links indicates that this is a malware campaign rather than a software vulnerability. The threat is documented by AlienVault and analyzed in detail by Trellix researchers, providing actionable intelligence for defenders.
Potential Impact
For European organizations, XWorm V6 poses significant risks primarily through unauthorized remote access and data exfiltration. The malware’s ability to bypass AMSI and execute obfuscated PowerShell scripts complicates detection and response efforts, potentially allowing attackers to maintain long-term persistence. Confidentiality is at risk due to credential theft and file management capabilities, while integrity and availability may be compromised through remote desktop control and process injection, which can be used to manipulate or disrupt critical systems. Sectors such as finance, healthcare, government, and critical infrastructure in Europe are particularly vulnerable due to their reliance on Windows-based environments and remote management tools. The phishing-based delivery vector increases the attack surface, especially in organizations with less mature email security and user awareness programs. The medium severity rating reflects the malware’s potent capabilities balanced against the need for user interaction and the absence of zero-day exploits. However, the rapid adoption of XWorm V6 by threat actors suggests a growing threat landscape that could escalate if combined with targeted campaigns or supply chain compromises.
Mitigation Recommendations
European organizations should implement layered defenses focusing on detection and prevention of script-based attacks. Specific recommendations include: 1) Enforce strict PowerShell execution policies, such as constrained language mode and script signing requirements, to limit unauthorized script execution. 2) Deploy advanced endpoint detection and response (EDR) solutions capable of identifying AMSI bypass attempts, process injection, and anomalous remote desktop sessions. 3) Harden email gateways with robust phishing detection, sandboxing, and URL filtering to block malicious JavaScript attachments and links. 4) Conduct regular user training focused on phishing awareness and safe handling of email attachments. 5) Monitor network traffic for unusual command and control patterns associated with XWorm’s communication techniques. 6) Implement application whitelisting to restrict execution of unauthorized scripts and binaries. 7) Maintain up-to-date backups and incident response plans to quickly recover from potential compromises. 8) Utilize threat intelligence feeds to stay informed about emerging XWorm variants and indicators of compromise. These measures, combined with proactive hunting for suspicious PowerShell and JavaScript activity, will reduce the risk and impact of XWorm V6 infections.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- hash: a11466bee082a37915c25b84f839a728
- hash: 0be606b363366742133a6c316736bab6bca54831
- hash: 570e4d52b259b460aa17e8e286be64d5bada804bd4757c2475c0e34a73aeb869
- hash: 25e304f15acb97cab8a6b685d8c8ef05
- hash: 56d0e1e06598562c8fa70c657464cf77
- hash: 75f51daff0696bb59f14a9b3f12d3578
- hash: cbdfd0de5b3cda140b2213213218993e
- hash: 43b5045c089b7ddca49352dc6cd883c1d9d76c9e
- hash: 45bd7a00225cf42644965e7f61f26f060ac56d98
- hash: 70ab393489e5924d64b99e15526ddfbaa749523d
- hash: a96135197963d5022ab03b538adf587539e108fb
- hash: 000185a17254cd8863208d3828366ec25ddd01596f18e57301355d4a33eac242
- hash: 0c2bf36dd9ccb3478c8d3dd7912bcfc1f5d910845446e1adfd1e769490287ab4
- hash: 1990659a28b2c194293f106e98f5c5533fdad91e50fdeb1a9590d6b1d2983ada
- hash: 2b507d3ae01583c8abf4ca0486b918966643159a7c3ee7adb5f36c7bd2e4d70e
- hash: 31376631aec4800de046e1400e948936010d9bbedec91c45ae8013c1b87564d0
- hash: 33ee1961e302da3abc766480a58c0299b24c6ed8ceeb5803fa857617e37ca96e
- hash: 4ce4dc04639d673f0627afc678819d1a7f4b654445ba518a151b2e80e910a92c
- hash: 4d225af71d287f1264f3116075386ac2ce9ee9cd26fb8c3a938c2bf50cca8683
- hash: 5123b066f4b864e83bb14060f473cf5155d863f386577586dd6d2826e20e3988
- hash: 5314c7505002cda1e864eced654d132f773722fd621a04ffd84ae9bc0749b791
- hash: 64cbbbf90fe84eda1a8c2f41a4d37b1d60610e7136a02472a72c28b6acadc2fc
- hash: 6a0c1f70af17bd9258886f997bb43266aa816ff24315050bbf5f0e473d059485
- hash: 760a3d23ee860cf2686a3d0ef266e7e1ad835cc8b8ce69bfe68765c247753c6b
- hash: 8106b563e19c946bd76de7d00f7084f3fc3b435ed07eb4757c8da94c89570864
- hash: 8514a434b50879e2b8c56cf3fd35f341e24feae5290fa530cc30fae984b0e16c
- hash: 8d04215c281bd7be86f96fd1b24a418ba1c497f5dee3ae1978e4b454b32307a1
- hash: 995869775b9d43adeb7e0eb34462164bcfbee3ecb4eda3c436110bd9b905e7ba
- hash: b314836a3ca831fcb068616510572ac32e137ad31ae4b3e506267b429f9129b1
- hash: d46bb31dc93b89d67abffe144c56356167c9e57e3235bfb897eafc30626675bb
- hash: df0096bd57d333ca140331f1c0d54c741a368593a4aac628423ab218b59bd0bb
- hash: f279a3fed5b96214d0e3924eedb85907f44d63c7603b074ea975d1ec2fdde0b4
XWorm V6: Exploring Pivotal Plugins
Description
Since the release of XWorm V6.0 on June 4, 2025, we have noted a surge in samples identified as XWorm V6.0 on VirusTotal, reflecting its rapid adoption by threat actors. One prominent campaign illustrates its delivery: a malicious JavaScript (JS) file initiates a PowerShell (PS1) script, which deploys an injector to deliver the XWorm Client.
AI-Powered Analysis
Technical Analysis
XWorm V6 is a sophisticated remote access Trojan (RAT) that has gained rapid traction among threat actors since its release on June 4, 2025. The malware is primarily delivered through malicious JavaScript files that execute PowerShell scripts, which in turn deploy an injector to install the XWorm client on victim systems. This multi-stage infection chain allows the malware to evade traditional detection mechanisms by leveraging script-based execution and AMSI (Antimalware Scan Interface) bypass techniques. The malware incorporates a range of capabilities including remote desktop access, file management, credential harvesting, and process injection (notably process hollowing and thread injection), enabling attackers to maintain persistent and stealthy control over compromised hosts. The use of PowerShell and JavaScript as delivery and execution vectors aligns with common phishing campaigns, increasing the likelihood of successful initial compromise. The malware’s modular design allows it to load pivotal plugins that extend its functionality, making it adaptable to different operational needs. Although there are no known exploits in the wild targeting specific vulnerabilities, the threat relies heavily on social engineering and script execution to infiltrate environments. The tags associated with the threat (e.g., T1012, T1027, T1036, T1041, T1055, T1056, T1057, T1059) correspond to MITRE ATT&CK techniques such as system information discovery, obfuscated files or information, masquerading, command and control, process injection, input capture, system service discovery, and command-line interface usage, highlighting the malware’s comprehensive attack lifecycle. The absence of affected versions and patch links indicates that this is a malware campaign rather than a software vulnerability. The threat is documented by AlienVault and analyzed in detail by Trellix researchers, providing actionable intelligence for defenders.
Potential Impact
For European organizations, XWorm V6 poses significant risks primarily through unauthorized remote access and data exfiltration. The malware’s ability to bypass AMSI and execute obfuscated PowerShell scripts complicates detection and response efforts, potentially allowing attackers to maintain long-term persistence. Confidentiality is at risk due to credential theft and file management capabilities, while integrity and availability may be compromised through remote desktop control and process injection, which can be used to manipulate or disrupt critical systems. Sectors such as finance, healthcare, government, and critical infrastructure in Europe are particularly vulnerable due to their reliance on Windows-based environments and remote management tools. The phishing-based delivery vector increases the attack surface, especially in organizations with less mature email security and user awareness programs. The medium severity rating reflects the malware’s potent capabilities balanced against the need for user interaction and the absence of zero-day exploits. However, the rapid adoption of XWorm V6 by threat actors suggests a growing threat landscape that could escalate if combined with targeted campaigns or supply chain compromises.
Mitigation Recommendations
European organizations should implement layered defenses focusing on detection and prevention of script-based attacks. Specific recommendations include: 1) Enforce strict PowerShell execution policies, such as constrained language mode and script signing requirements, to limit unauthorized script execution. 2) Deploy advanced endpoint detection and response (EDR) solutions capable of identifying AMSI bypass attempts, process injection, and anomalous remote desktop sessions. 3) Harden email gateways with robust phishing detection, sandboxing, and URL filtering to block malicious JavaScript attachments and links. 4) Conduct regular user training focused on phishing awareness and safe handling of email attachments. 5) Monitor network traffic for unusual command and control patterns associated with XWorm’s communication techniques. 6) Implement application whitelisting to restrict execution of unauthorized scripts and binaries. 7) Maintain up-to-date backups and incident response plans to quickly recover from potential compromises. 8) Utilize threat intelligence feeds to stay informed about emerging XWorm variants and indicators of compromise. These measures, combined with proactive hunting for suspicious PowerShell and JavaScript activity, will reduce the risk and impact of XWorm V6 infections.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.trellix.com/blogs/research/xworm-v6-exploring-pivotal-plugins/"]
- Adversary
- XWorm
- Pulse Id
- 68e4116d2907e024806e89fc
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hasha11466bee082a37915c25b84f839a728 | MD5 of 570e4d52b259b460aa17e8e286be64d5bada804bd4757c2475c0e34a73aeb869 | |
hash0be606b363366742133a6c316736bab6bca54831 | SHA1 of 570e4d52b259b460aa17e8e286be64d5bada804bd4757c2475c0e34a73aeb869 | |
hash570e4d52b259b460aa17e8e286be64d5bada804bd4757c2475c0e34a73aeb869 | — | |
hash25e304f15acb97cab8a6b685d8c8ef05 | MD5 of 6a0c1f70af17bd9258886f997bb43266aa816ff24315050bbf5f0e473d059485 | |
hash56d0e1e06598562c8fa70c657464cf77 | MD5 of 000185a17254cd8863208d3828366ec25ddd01596f18e57301355d4a33eac242 | |
hash75f51daff0696bb59f14a9b3f12d3578 | MD5 of d46bb31dc93b89d67abffe144c56356167c9e57e3235bfb897eafc30626675bb | |
hashcbdfd0de5b3cda140b2213213218993e | MD5 of 1990659a28b2c194293f106e98f5c5533fdad91e50fdeb1a9590d6b1d2983ada | |
hash43b5045c089b7ddca49352dc6cd883c1d9d76c9e | SHA1 of 1990659a28b2c194293f106e98f5c5533fdad91e50fdeb1a9590d6b1d2983ada | |
hash45bd7a00225cf42644965e7f61f26f060ac56d98 | SHA1 of d46bb31dc93b89d67abffe144c56356167c9e57e3235bfb897eafc30626675bb | |
hash70ab393489e5924d64b99e15526ddfbaa749523d | SHA1 of 000185a17254cd8863208d3828366ec25ddd01596f18e57301355d4a33eac242 | |
hasha96135197963d5022ab03b538adf587539e108fb | SHA1 of 6a0c1f70af17bd9258886f997bb43266aa816ff24315050bbf5f0e473d059485 | |
hash000185a17254cd8863208d3828366ec25ddd01596f18e57301355d4a33eac242 | — | |
hash0c2bf36dd9ccb3478c8d3dd7912bcfc1f5d910845446e1adfd1e769490287ab4 | — | |
hash1990659a28b2c194293f106e98f5c5533fdad91e50fdeb1a9590d6b1d2983ada | — | |
hash2b507d3ae01583c8abf4ca0486b918966643159a7c3ee7adb5f36c7bd2e4d70e | — | |
hash31376631aec4800de046e1400e948936010d9bbedec91c45ae8013c1b87564d0 | — | |
hash33ee1961e302da3abc766480a58c0299b24c6ed8ceeb5803fa857617e37ca96e | — | |
hash4ce4dc04639d673f0627afc678819d1a7f4b654445ba518a151b2e80e910a92c | — | |
hash4d225af71d287f1264f3116075386ac2ce9ee9cd26fb8c3a938c2bf50cca8683 | — | |
hash5123b066f4b864e83bb14060f473cf5155d863f386577586dd6d2826e20e3988 | — | |
hash5314c7505002cda1e864eced654d132f773722fd621a04ffd84ae9bc0749b791 | — | |
hash64cbbbf90fe84eda1a8c2f41a4d37b1d60610e7136a02472a72c28b6acadc2fc | — | |
hash6a0c1f70af17bd9258886f997bb43266aa816ff24315050bbf5f0e473d059485 | — | |
hash760a3d23ee860cf2686a3d0ef266e7e1ad835cc8b8ce69bfe68765c247753c6b | — | |
hash8106b563e19c946bd76de7d00f7084f3fc3b435ed07eb4757c8da94c89570864 | — | |
hash8514a434b50879e2b8c56cf3fd35f341e24feae5290fa530cc30fae984b0e16c | — | |
hash8d04215c281bd7be86f96fd1b24a418ba1c497f5dee3ae1978e4b454b32307a1 | — | |
hash995869775b9d43adeb7e0eb34462164bcfbee3ecb4eda3c436110bd9b905e7ba | — | |
hashb314836a3ca831fcb068616510572ac32e137ad31ae4b3e506267b429f9129b1 | — | |
hashd46bb31dc93b89d67abffe144c56356167c9e57e3235bfb897eafc30626675bb | — | |
hashdf0096bd57d333ca140331f1c0d54c741a368593a4aac628423ab218b59bd0bb | — | |
hashf279a3fed5b96214d0e3924eedb85907f44d63c7603b074ea975d1ec2fdde0b4 | — |
Threat ID: 68e412954d3b0698c00ae5e5
Added to database: 10/6/2025, 7:03:49 PM
Last enriched: 10/6/2025, 7:04:40 PM
Last updated: 10/7/2025, 8:13:03 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Nimbus Manticore Deploys New Malware Targeting Europe
MediumNpm Package Hides Malware in Steganographic QR Codes
HighIranian State Hackers Use SSL.com Certificates to Sign Malware
MediumChina Exploited New VMware Bug for Nearly a Year
Medium'Klopatra' Trojan Makes Bank Transfers While You Sleep
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.