Latest Job Opportunities in India
Discover top job listings and career opportunities across India. Stay updated with the latest openings in IT, government, and more.
Check Out Jobs!Read More
New affected Windows apps XWorm V6 with a harmful code –
Publishing views: 23
“Reliable Windows applications are affected by a harmful symbol via the latest XWorm V6 variable.”
Reporting is not only useful in the world of change constantly from electronic threats but also necessary. When XWorm was first discovered in 2022, it immediately became known as a very strong piece of harmful programs that gave the infiltrators a wide range of tools to use for their nefarious purposes.
XWorm’s Modular is a key customer and a variety of specialized parts called additions. In essence, these additional ingredients are additional loads aimed at performing certain devastating tasks as soon as the main virus is activated.
Because of its multiple uses, attackers can exploit XWorm’s capabilities of a variety of goals, from continuous monitoring to data theft and system control.
Understanding these additional components is necessary for cybersecurity experts who protect their companies, as well as users of cybersecurity products who are looking to enhance their defenses against these common dangers.
Trellix Arc watched carefully about the development of XWorm, including the last return to it. In this article, we will deepen more to examine a campaign that uses XWorm V6.0, and more important, main additional additions and additional load, such as the persistent text program.
From desertion to chaos
Regular updates have been published on the development of XWorm, led by “XCoder”, via a telegram. After Xworm V5.6 in late 2024, Xcoder ended the official support and left V5.6 as a copy that was believed to be final.
After that, the actors threatened to publish V5 cracks. Six builders were injured in Trojan horses that unintentionally affected the operators. Cloudsek and DMPDOMP have been reported about Troji builders and changes that have been changed, while XSPY appeared, which is changing in Chinese.
Another setback was to discover a serious defect in the implementation of the remote symbol in the V5.6, which allowed the attackers to run an arbitrary code using the C2 encryption key – exploitation confirmed in laboratories.
Several experts focused their focus elsewhere after the conclusion that Xworm is no longer a threat, but the retirement of harmful programs is rarely permanent.
“Xcodrtools” published an advertisement about Xworm V6.0 on Hackforums.net on June 4, 2025, claiming improvements and solutions for RCE weakness.
There was a lot of doubt: Was Xcodrtools the real author, or was it just a shaded character that benefited from the good XWorm? The operators were forced to refer after two telegrams, one for updates and the other for discussion, appeared on the surface but was constantly banned.

Asala is still in questioning, although community videos display new features. The unique discoveries of XWorm V6.0 have increased since their launch, highlighting the absorption of actors in the rapid threat.
Arsenal supplement and infection chain
The V6.0 campaign, known as the harmful JavaScript file that displays unprocessed PDF trap and downloads and runs the PowerShell program.

Remotesktop.dl, stereer.dll, filemanager.dll, shell.dll, and Ransomware.dll is a noticeable load. The latter drops Ransom notes and backgrounds, codes files using AES-CBC key with a SHA-512 retail for the customer’s identifier, and the registration flags are appointed to monitor the coding state.
This technique is reflected in decoding. With more stereotypes that allow the installation of ROOTKIT and ROSET in the factory in Builds V6.4, the V6 has more than 35 additional accessories.
Stability and change risk
To bear the reinstallation, fixed text programs that are distributed as VBS or .WSf files create registration keys, scheduled tasks, and even reset them.
From hooks to re -set the factory at the supervisor level to the login software, the operators use four different methods of stability.
The issue of self -mobilization is displayed where the builders themselves show harmful programs through the fact that the cracking companies that have been cracking publish the injured builders.

The return of XWorm V6 emphasizes that malware threats do not completely disappear. Advanced injection tactics and architecture of the additional component require defenses that exceed the prevention of signing.
It is necessary to have a multi -layer position, including e -mail and activity gates to stop the initial points, discover the end point and respond to discover the unusual process injection, and monitor the continuous network to determine the C2 connections.
Behavioral -focused security techniques are necessary in the scene of a constant threat to maintain a single step on the opponents.
IOC
Below are the data provided in the form of a tabular:
| Sha256 | name |
| 995869775B9D43ADB7E0B30B30B3462164BCFBEE3ECB4eda3c436110BD9B905E7BA | Osha_investignist_Case_0625oqi685837Aw.pdf.js |
| 4CE4DC04639D673f0627afc67819D1A7F4B654445BA518a151B2E80E910A92C | Payload_1.ps1 |
| 8514A433B50879E2B8C56Cf3fd35F341E24fee5290FA530C30FAE984B0E16C | ClassslBRary7.dll |
| 570E4D52B259B460A17E8E286be64D5BADA804BD4757c2475C0E34A73aeb869 | xwormclient.exe |
| 000185a17254cd8863208d3828366EC25DD01596f18E5730135d4a33k242 | Runshell.exe |
| 4d225af71d287f1264f3116075386ac2ce9E9Cd26fb8C3a938c2BFF50cca8683 | 000053ab01136548.wsf |
| 760a3d23e8660cf268a3d0ef26e7e1ad835c8B8Ce69Bfe68765c247753c6b | 00001EF600BD20.WSF |
| 8106B563E19c946BD76De7d00f7084f3fc3b435ed07B4757c8Da94c89570864 | Win32.exe |
| 1990659a28B2c194293f106e98f5c5533fdad91E50FDB1A9590D6B1D2983ADA | Chrome_decrypt.dll |
| D46BB31DC93B89D67BFEFE144C56356167C9E57E323BFB897eAFC30666675BB | Chromiumdecryption |
| F279a3FED5B96214D0E3924EEDB85907F4D63C7603B074EA975D1EC2FDE0B4 | Windowsupdate.dll |
| 31376631aEC4800de046e1400E94893601BEDEC91C45ae8013c1B87564d0 | Remotesktop.dll |
| 5123B066f4B864E83B14060f473cf5155D863f386577586dd6d2826E20E3988 | Remotesktop.dll |
| B314836a3ca831fcb068616510572ac32E13ad31ae4B3e5506267B429f9129b1 | Filemanager.dll |
| 5314c7505002cda1E864ECED654D132F77372FD621A04FD84AE9BC0749B791 | Tcpconnections.dll |
| 33e1961E302Da3abc766480a58c0299B24c6ed8CeeB5803fa857617E37CA96E | to merge |
| 2B507d3e01583c8abff4Ca0486B918966643159a7c3e7adb5f36c7BD2E4D70E | Systemcheck.Merged.dll |
| DF0096BD57D333CA140331F1C0D54c741A368593a4aac628423ab218B59BD0BB | Shell.dll |
| 0c2BF36DD9CB3478C8D3DD7912112BCFC1F5D910845446E1ADDD1E769490287Ab4 | Stealer.dll |
| 64cbbbff90fe84eda1a8c2f41a4D37B1D60E7136a02472A72C28B6ACADC2FC | Ransomware.dll |
| 6A0c1f70af17BD925886F997BB43266AAA816F24315050550AFF5F0E473d059485 | Rootkit.dll |
| 8d04215c281bd7be86f96fd1B24a418Ba1c497f5dee3ae1978E4B454B32307A1 | ResetrVival.dll |
About the author
Suraj Cole He is a content specialist in technical writing about cybersecurity and information security. He wrote many amazing articles on cybersecurity concepts, with the latest trends in electronic awareness and ethical piracy. Learn more about “him”.
Read more:
About the author
New XWorm V6 Variant Infected Windows Applications with Malicious Code



