Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

XWorm V6: Exploring Pivotal Plugins

0
Medium
Published: Mon Oct 06 2025 (10/06/2025, 18:58:53 UTC)
Source: AlienVault OTX General

Description

Since the release of XWorm V6.0 on June 4, 2025, we have noted a surge in samples identified as XWorm V6.0 on VirusTotal, reflecting its rapid adoption by threat actors. One prominent campaign illustrates its delivery: a malicious JavaScript (JS) file initiates a PowerShell (PS1) script, which deploys an injector to deliver the XWorm Client.

AI-Powered Analysis

AILast updated: 10/06/2025, 19:04:40 UTC

Technical Analysis

XWorm V6 is a sophisticated remote access Trojan (RAT) that has gained rapid traction among threat actors since its release on June 4, 2025. The malware is primarily delivered through malicious JavaScript files that execute PowerShell scripts, which in turn deploy an injector to install the XWorm client on victim systems. This multi-stage infection chain allows the malware to evade traditional detection mechanisms by leveraging script-based execution and AMSI (Antimalware Scan Interface) bypass techniques. The malware incorporates a range of capabilities including remote desktop access, file management, credential harvesting, and process injection (notably process hollowing and thread injection), enabling attackers to maintain persistent and stealthy control over compromised hosts. The use of PowerShell and JavaScript as delivery and execution vectors aligns with common phishing campaigns, increasing the likelihood of successful initial compromise. The malware’s modular design allows it to load pivotal plugins that extend its functionality, making it adaptable to different operational needs. Although there are no known exploits in the wild targeting specific vulnerabilities, the threat relies heavily on social engineering and script execution to infiltrate environments. The tags associated with the threat (e.g., T1012, T1027, T1036, T1041, T1055, T1056, T1057, T1059) correspond to MITRE ATT&CK techniques such as system information discovery, obfuscated files or information, masquerading, command and control, process injection, input capture, system service discovery, and command-line interface usage, highlighting the malware’s comprehensive attack lifecycle. The absence of affected versions and patch links indicates that this is a malware campaign rather than a software vulnerability. The threat is documented by AlienVault and analyzed in detail by Trellix researchers, providing actionable intelligence for defenders.

Potential Impact

For European organizations, XWorm V6 poses significant risks primarily through unauthorized remote access and data exfiltration. The malware’s ability to bypass AMSI and execute obfuscated PowerShell scripts complicates detection and response efforts, potentially allowing attackers to maintain long-term persistence. Confidentiality is at risk due to credential theft and file management capabilities, while integrity and availability may be compromised through remote desktop control and process injection, which can be used to manipulate or disrupt critical systems. Sectors such as finance, healthcare, government, and critical infrastructure in Europe are particularly vulnerable due to their reliance on Windows-based environments and remote management tools. The phishing-based delivery vector increases the attack surface, especially in organizations with less mature email security and user awareness programs. The medium severity rating reflects the malware’s potent capabilities balanced against the need for user interaction and the absence of zero-day exploits. However, the rapid adoption of XWorm V6 by threat actors suggests a growing threat landscape that could escalate if combined with targeted campaigns or supply chain compromises.

Mitigation Recommendations

European organizations should implement layered defenses focusing on detection and prevention of script-based attacks. Specific recommendations include: 1) Enforce strict PowerShell execution policies, such as constrained language mode and script signing requirements, to limit unauthorized script execution. 2) Deploy advanced endpoint detection and response (EDR) solutions capable of identifying AMSI bypass attempts, process injection, and anomalous remote desktop sessions. 3) Harden email gateways with robust phishing detection, sandboxing, and URL filtering to block malicious JavaScript attachments and links. 4) Conduct regular user training focused on phishing awareness and safe handling of email attachments. 5) Monitor network traffic for unusual command and control patterns associated with XWorm’s communication techniques. 6) Implement application whitelisting to restrict execution of unauthorized scripts and binaries. 7) Maintain up-to-date backups and incident response plans to quickly recover from potential compromises. 8) Utilize threat intelligence feeds to stay informed about emerging XWorm variants and indicators of compromise. These measures, combined with proactive hunting for suspicious PowerShell and JavaScript activity, will reduce the risk and impact of XWorm V6 infections.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.trellix.com/blogs/research/xworm-v6-exploring-pivotal-plugins/"]
Adversary
XWorm
Pulse Id
68e4116d2907e024806e89fc
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hasha11466bee082a37915c25b84f839a728
MD5 of 570e4d52b259b460aa17e8e286be64d5bada804bd4757c2475c0e34a73aeb869
hash0be606b363366742133a6c316736bab6bca54831
SHA1 of 570e4d52b259b460aa17e8e286be64d5bada804bd4757c2475c0e34a73aeb869
hash570e4d52b259b460aa17e8e286be64d5bada804bd4757c2475c0e34a73aeb869
hash25e304f15acb97cab8a6b685d8c8ef05
MD5 of 6a0c1f70af17bd9258886f997bb43266aa816ff24315050bbf5f0e473d059485
hash56d0e1e06598562c8fa70c657464cf77
MD5 of 000185a17254cd8863208d3828366ec25ddd01596f18e57301355d4a33eac242
hash75f51daff0696bb59f14a9b3f12d3578
MD5 of d46bb31dc93b89d67abffe144c56356167c9e57e3235bfb897eafc30626675bb
hashcbdfd0de5b3cda140b2213213218993e
MD5 of 1990659a28b2c194293f106e98f5c5533fdad91e50fdeb1a9590d6b1d2983ada
hash43b5045c089b7ddca49352dc6cd883c1d9d76c9e
SHA1 of 1990659a28b2c194293f106e98f5c5533fdad91e50fdeb1a9590d6b1d2983ada
hash45bd7a00225cf42644965e7f61f26f060ac56d98
SHA1 of d46bb31dc93b89d67abffe144c56356167c9e57e3235bfb897eafc30626675bb
hash70ab393489e5924d64b99e15526ddfbaa749523d
SHA1 of 000185a17254cd8863208d3828366ec25ddd01596f18e57301355d4a33eac242
hasha96135197963d5022ab03b538adf587539e108fb
SHA1 of 6a0c1f70af17bd9258886f997bb43266aa816ff24315050bbf5f0e473d059485
hash000185a17254cd8863208d3828366ec25ddd01596f18e57301355d4a33eac242
hash0c2bf36dd9ccb3478c8d3dd7912bcfc1f5d910845446e1adfd1e769490287ab4
hash1990659a28b2c194293f106e98f5c5533fdad91e50fdeb1a9590d6b1d2983ada
hash2b507d3ae01583c8abf4ca0486b918966643159a7c3ee7adb5f36c7bd2e4d70e
hash31376631aec4800de046e1400e948936010d9bbedec91c45ae8013c1b87564d0
hash33ee1961e302da3abc766480a58c0299b24c6ed8ceeb5803fa857617e37ca96e
hash4ce4dc04639d673f0627afc678819d1a7f4b654445ba518a151b2e80e910a92c
hash4d225af71d287f1264f3116075386ac2ce9ee9cd26fb8c3a938c2bf50cca8683
hash5123b066f4b864e83bb14060f473cf5155d863f386577586dd6d2826e20e3988
hash5314c7505002cda1e864eced654d132f773722fd621a04ffd84ae9bc0749b791
hash64cbbbf90fe84eda1a8c2f41a4d37b1d60610e7136a02472a72c28b6acadc2fc
hash6a0c1f70af17bd9258886f997bb43266aa816ff24315050bbf5f0e473d059485
hash760a3d23ee860cf2686a3d0ef266e7e1ad835cc8b8ce69bfe68765c247753c6b
hash8106b563e19c946bd76de7d00f7084f3fc3b435ed07eb4757c8da94c89570864
hash8514a434b50879e2b8c56cf3fd35f341e24feae5290fa530cc30fae984b0e16c
hash8d04215c281bd7be86f96fd1b24a418ba1c497f5dee3ae1978e4b454b32307a1
hash995869775b9d43adeb7e0eb34462164bcfbee3ecb4eda3c436110bd9b905e7ba
hashb314836a3ca831fcb068616510572ac32e137ad31ae4b3e506267b429f9129b1
hashd46bb31dc93b89d67abffe144c56356167c9e57e3235bfb897eafc30626675bb
hashdf0096bd57d333ca140331f1c0d54c741a368593a4aac628423ab218b59bd0bb
hashf279a3fed5b96214d0e3924eedb85907f44d63c7603b074ea975d1ec2fdde0b4

Threat ID: 68e412954d3b0698c00ae5e5

Added to database: 10/6/2025, 7:03:49 PM

Last enriched: 10/6/2025, 7:04:40 PM

Last updated: 10/7/2025, 8:13:03 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats