Description

Trellix ARC's recent analysis reports the unexpected comeback of XWorm as V6.0 following the disappearance of the original developer (XCoder) in late 2024. Made public on June 4, 2025 by an actor self-describing as XCoderTools, the new build resolves earlier vulnerabilities and greatly increases functionality. Infection chains seen by researchers begin with a JavaScript delivered via phishing that launches a PowerShell loader, deactivates AMSI, and employs an injector to conceal XWorm within legitimate processes such as RegSvcs.exe. The most prominent improvement is the plugin base: V6.0 features 35+ DLL modules like RemoteDesktop.dll, assorted stealers (WindowsUpdate.dll), FileManager.dll with encryption capabilities, and Webcam.dll. These plugins are utilized by operators to steal credentials, laterally move, and install other malware (DarkCloud Stealer, Hworm, Snake KeyLogger, coin miners). Persistence is robust and diverse ranging from registry run keys to abuse of ResetConfig.xml tactics akin to other RAT families such as Pulsar. Alarmingly, XWorm V6.0 also has a ransomware plugin that encrypts files (AES?CBC), personalizes ransom notes and desktop wallpaper, and can decrypt on demand, reusing code from previous NoCry variants. Underground commerce in cracked builders most prominently a leaked build related to the Celestial Project has resulted in operator infections and several re?infection scenarios. Trellix's research underscores both the malware's latest sophistication and the risks of operations presented when malicious tooling proliferates and is compromised in criminal marketplaces.