Sunday, December 7, 2025

XWorm Malware Evolves with Ransomware Capabilities and Expanded Features

XWorm ‌Malware Returns with Ransomware Payload, Expanding Plugin‌ Arsenal

A ⁣modular malware strain known as xworm has resurfaced with a new ransomware⁣ component and a sprawling collection of over 35⁢ plugins, enabling extensive data theft and remote access ⁣capabilities, security researchers at Trellix have ⁣discovered.

First observed in 2021, XWorm initially functioned as‌ an information stealer and⁤ remote access trojan. The latest iteration⁤ demonstrates⁢ a significant‌ escalation in threat level with ⁢the addition of a ransomware module sharing encryption algorithms with the NoCry ransomware family. Both​ XWorm’s ransomware and NoCry utilize ⁢AES encryption with CBC mode in 4096-byte blocks and employ the same method for generating initialization vectors (IVs) and encryption keys.

Trellix’s analysis revealed the malware shares evasion tactics with NoCry, running the same verification checks ⁤to detect analysis environments. Beyond the ransomware, XWorm boasts a library of⁢ 14 plugins, each designed for a specific malicious function. These include:

* RemoteDesktop.dll: Enables remote control of infected machines.
* WindowsUpdate.dll,Stealer.dll, Recovery.dll, merged.dll, Chromium.dll, and ⁣SystemCheck.Merged.dll: Focused on stealing victim data.
* FileManager.dll: ‍ Grants operators filesystem access ⁣and manipulation.
* ⁣ Shell.dll: Executes system commands via a hidden cmd.exe process.
* Informations.dll: Collects system information.
* Webcam.dll: Records victims⁤ and verifies machine authenticity for⁢ operators.
*⁤ TCPConnections.dll,ActiveWindows.dll, and StartupManager.dll: Transmits⁤ lists⁤ of active TCP connections, open windows, and startup programs to the command ‌and control (C2) server.

The data theft modules alone are capable of harvesting login credentials⁣ from⁢ more than 35 web browsers, email clients, messaging applications, FTP clients,⁣ and cryptocurrency wallets.

Trellix recommends a multi-layered​ security approach to defend ​against‍ XWorm, including endpoint detection and response (EDR) solutions to identify malicious ⁢module behavior, proactive​ email and web protections to block initial infection vectors, and network monitoring to detect communication with the C2 server.

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.