XWorm Malware Analysis: SOC & IR Perspective on Persistence, C2, and Anti-Analysis Tactics
quality 7/10 · good
0 net
XWorm Malware Analysis: SOC & IR Perspective on Persistence, C2, and Anti-Analysis Tactics | by Zyad Waleed Elzyat - Freedium
Milestone: 20GB Reached
We’ve reached 20GB of stored data — thank you for helping us grow!
Patreon
Ko-fi
Liberapay
Close
< Go to the original
XWorm Malware Analysis: SOC & IR Perspective on Persistence, C2, and Anti-Analysis Tactics
XWorm malware analysis from SOC & IR perspective. Learn about persistence, C2, encryption, anti-analysis tactics, and key IOCs for…
Zyad Waleed Elzyat
Follow
~4 min read
·
September 12, 2025 (Updated: September 12, 2025)
·
Free: Yes
XWorm malware analysis from SOC & IR perspective. Learn about persistence, C2, encryption, anti-analysis tactics, and key IOCs for detection & response.
Introduction
In recent years, XWorm malware has emerged as one of the more versatile and evasive threats targeting enterprises and individuals alike. Written in .NET , this remote-access trojan (RAT) and backdoor family has been observed delivering persistent access , data exfiltration , and encrypted command-and-control (C2) communication .
In this article, we break down the findings of an in-depth analysis of two XWorm samples , exploring their encryption, persistence mechanisms, anti-analysis tricks, and the Indicators of Compromise (IOCs) defenders need to know.
📌 This report is written from a SOC (Security Operations Center) and Incident Response (IR) perspective, focusing on actionable insights for detection, containment, and mitigation.
Table of Contents
Malware Samples Information
Command and Control (C2) Infrastructure
De-Obfuscation Techniques
Malware Encryption Algorithm
Persistence Mechanisms
Information Gathering and Exfiltration
Anti-Analysis Techniques
IOC's
Malware Samples Analyzed
Two malicious executables were reviewed, both heavily obfuscated .NET binaries :
Sample 1 Details :
MD5 7c7aff561f11d16a6ec8a999a2b8cdad
SHA-1 a3f6e039f346a7234bf5243568c05d63cc01fd87
SHA256
ced525930c76834184b4e194077c8c4e7342b3323544365b714943519a0f92af
Type .NET Executable
Sample 2 Details :
MD5 806e784be61b0321fb659dab71a109f8
SHA-1 6fa16df45e33d90c75a43a2412a7fe98ab7fb859
SHA-256 94ec50f2df421486907c7533ee4380c219b57cf23ebab9fce3f03334408e4c06
Type .NET Executable
Both exhibited high entropy , signaling packing and string obfuscation , consistent with MITRE T1027.002 — Software Packing .
🔍 Takeaway: Always submit suspicious hashes to VirusTotal , Triage , or AnyRun during SOC triage.
Command and Control (C2)
XWorm uses multiple IPs, domains, and Telegram channels for command-and-control. This redundancy makes simple IP blocking insufficient.
Key C2 infrastructure identified:
IPs : 104.208.16.94 , 185.117.249.43 , 20.69.140.28
Domains : copy-marco.gl.at.ply.gg , fp2e7a.wpc.2be4.phicdn.net
Telegram Bot API : leveraged for exfiltration and tasking
Obfuscation & De-Obfuscation
XWorm relies on string encryption and packing to evade signature-based detection.
Tools like de4dot can be used to reverse-engineer .NET obfuscation.
https://github.com/kant2002/de4dot
Post-de-obfuscation, analysts gain access to clear AES-CBC encryption routines and persistence logic.
Encryption Algorithm
XWorm protects its C2 traffic with AES (RijndaelManaged in CBC mode) , ensuring sensitive exfiltrated data remains concealed.
This makes network-based detection harder, shifting the burden to behavioral monitoring and endpoint detection .
Persistence Mechanisms
Persistence is achieved through multi-layered techniques , ensuring reinfection after reboot:
Scheduled Tasks (MITRE T1053.005)
Registry Run Keys / Startup Folder (MITRE T1547.001)
AppData Placement for stealthy execution
Information Gathering & Exfiltration
XWorm collects system metadata , including:
OS version
Username & machine ID
CPU/GPU/RAM details
Connected USB devices
This telemetry is sent to Telegram , tagged with malware version identifiers like XWorm V5.0 .
Anti-Analysis Techniques
XWorm implements robust evasion strategies :
Debugger Detection — exits if a debugger is attached.
VM / Sandbox Detection — scans for VMware and VirtualBox .
Cloud/Hosting Checks — queries ip-api.com to detect AWS/Azure/Google Cloud .
OS Version Filtering — avoids execution on older Windows (e.g., XP).
These map to MITRE ATT&CK IDs: T1497.001, T1497.002, T1622 .
Indicators of Compromise (IOCs)
Add these IOCs to your threat-hunting lists, blocklists, and detection rules:
104.208.16.94
150.171.22.17
151.101.22.172
184.25.113.6
184.25.113.61
185.117.249.43
20.69.140.28
20.99.133.109
185.117.250.169:7000
66.175.239.149:7000
copy-marco.gl.at.ply.gg
fp2e7a.wpc.2be4.phicdn.net
hxxps[://]api[.]telegram[.]org/bot
XWorm V5.0
WmiPrvSE.exe
WmiPrvSE.lnk
Soundman.exe
hxxps[://]api[.]telegram[.]org/bot5835520796:AAEDP1FiQ-0LFxO6-eDNugzON7bdAxLBrXs/sendMessage?chat_id=-4094900225&text=%E2%98%A0%20[XWorm%20V5.0]New%20Clinet%20:%20899A34CB785F521B3558UserName%20:%20azureOSFullName%20:%20Microsoft%20Windows%207%20Professional%20USB%20:%20FalseCPU%20:%20Intel%20Xeon%20%20@%202.20GHzGPU%20:%20Standard%20VGA%20Graphics%20Adapter%20RAM%20:%201.99%20GBGroub%20:%20XWorm%20V5.0
#malware #malware-analysis #cybersecurity #security
Reporting a Problem
Sometimes we have problems displaying some Medium posts.
If you have a problem that some images aren't loading - try using VPN. Probably you have problem with
access to Medium CDN (or fucking Cloudflare's bot detection algorithms are blocking you).