New affected Windows apps XWorm V6 with a harmful code –

XWorm V6 Malware Variant Infects Windows Applications with Malicious Code
Latest Job Opportunities in India

Latest Job Opportunities in India

Discover top job listings and career opportunities across India. Stay updated with the latest openings in IT, government, and more.

Check Out Jobs!
Read More

New affected Windows apps XWorm V6 with a harmful code –


Publishing views: 23

“Reliable Windows applications are affected by a harmful symbol via the latest XWorm V6 variable.”

Reporting is not only useful in the world of change constantly from electronic threats but also necessary. When XWorm was first discovered in 2022, it immediately became known as a very strong piece of harmful programs that gave the infiltrators a wide range of tools to use for their nefarious purposes.

XWorm’s Modular is a key customer and a variety of specialized parts called additions. In essence, these additional ingredients are additional loads aimed at performing certain devastating tasks as soon as the main virus is activated.

Because of its multiple uses, attackers can exploit XWorm’s capabilities of a variety of goals, from continuous monitoring to data theft and system control.

Understanding these additional components is necessary for cybersecurity experts who protect their companies, as well as users of cybersecurity products who are looking to enhance their defenses against these common dangers.

Trellix Arc watched carefully about the development of XWorm, including the last return to it. In this article, we will deepen more to examine a campaign that uses XWorm V6.0, and more important, main additional additions and additional load, such as the persistent text program.

From desertion to chaos

Regular updates have been published on the development of XWorm, led by “XCoder”, via a telegram. After Xworm V5.6 in late 2024, Xcoder ended the official support and left V5.6 as a copy that was believed to be final.

After that, the actors threatened to publish V5 cracks. Six builders were injured in Trojan horses that unintentionally affected the operators. Cloudsek and DMPDOMP have been reported about Troji builders and changes that have been changed, while XSPY appeared, which is changing in Chinese.

Another setback was to discover a serious defect in the implementation of the remote symbol in the V5.6, which allowed the attackers to run an arbitrary code using the C2 encryption key – exploitation confirmed in laboratories.

Several experts focused their focus elsewhere after the conclusion that Xworm is no longer a threat, but the retirement of harmful programs is rarely permanent.

“Xcodrtools” published an advertisement about Xworm V6.0 on Hackforums.net on June 4, 2025, claiming improvements and solutions for RCE weakness.

There was a lot of doubt: Was Xcodrtools the real author, or was it just a shaded character that benefited from the good XWorm? The operators were forced to refer after two telegrams, one for updates and the other for discussion, appeared on the surface but was constantly banned.

V6 alternative image appears

Asala is still in questioning, although community videos display new features. The unique discoveries of XWorm V6.0 have increased since their launch, highlighting the absorption of actors in the rapid threat.

Arsenal supplement and infection chain

The V6.0 campaign, known as the harmful JavaScript file that displays unprocessed PDF trap and downloads and runs the PowerShell program.

The image shows Windows applications

Remotesktop.dl, stereer.dll, filemanager.dll, shell.dll, and Ransomware.dll is a noticeable load. The latter drops Ransom notes and backgrounds, codes files using AES-CBC key with a SHA-512 retail for the customer’s identifier, and the registration flags are appointed to monitor the coding state.

This technique is reflected in decoding. With more stereotypes that allow the installation of ROOTKIT and ROSET in the factory in Builds V6.4, the V6 has more than 35 additional accessories.

Stability and change risk

To bear the reinstallation, fixed text programs that are distributed as VBS or .WSf files create registration keys, scheduled tasks, and even reset them.

From hooks to re -set the factory at the supervisor level to the login software, the operators use four different methods of stability.

The issue of self -mobilization is displayed where the builders themselves show harmful programs through the fact that the cracking companies that have been cracking publish the injured builders.

The image shows a malicious symbol

The return of XWorm V6 emphasizes that malware threats do not completely disappear. Advanced injection tactics and architecture of the additional component require defenses that exceed the prevention of signing.

It is necessary to have a multi -layer position, including e -mail and activity gates to stop the initial points, discover the end point and respond to discover the unusual process injection, and monitor the continuous network to determine the C2 connections.

Behavioral -focused security techniques are necessary in the scene of a constant threat to maintain a single step on the opponents.

IOC

Below are the data provided in the form of a tabular:

Sha256name
995869775B9D43ADB7E0B30B30B3462164BCFBEE3ECB4eda3c436110BD9B905E7BAOsha_investignist_Case_0625oqi685837Aw.pdf.js
4CE4DC04639D673f0627afc67819D1A7F4B654445BA518a151B2E80E910A92CPayload_1.ps1
8514A433B50879E2B8C56Cf3fd35F341E24fee5290FA530C30FAE984B0E16CClassslBRary7.dll
570E4D52B259B460A17E8E286be64D5BADA804BD4757c2475C0E34A73aeb869xwormclient.exe
000185a17254cd8863208d3828366EC25DD01596f18E5730135d4a33k242Runshell.exe
4d225af71d287f1264f3116075386ac2ce9E9Cd26fb8C3a938c2BFF50cca8683000053ab01136548.wsf
760a3d23e8660cf268a3d0ef26e7e1ad835c8B8Ce69Bfe68765c247753c6b00001EF600BD20.WSF
8106B563E19c946BD76De7d00f7084f3fc3b435ed07B4757c8Da94c89570864Win32.exe
1990659a28B2c194293f106e98f5c5533fdad91E50FDB1A9590D6B1D2983ADAChrome_decrypt.dll
D46BB31DC93B89D67BFEFE144C56356167C9E57E323BFB897eAFC30666675BBChromiumdecryption
F279a3FED5B96214D0E3924EEDB85907F4D63C7603B074EA975D1EC2FDE0B4Windowsupdate.dll
31376631aEC4800de046e1400E94893601BEDEC91C45ae8013c1B87564d0Remotesktop.dll
5123B066f4B864E83B14060f473cf5155D863f386577586dd6d2826E20E3988Remotesktop.dll
B314836a3ca831fcb068616510572ac32E13ad31ae4B3e5506267B429f9129b1Filemanager.dll
5314c7505002cda1E864ECED654D132F77372FD621A04FD84AE9BC0749B791Tcpconnections.dll
33e1961E302Da3abc766480a58c0299B24c6ed8CeeB5803fa857617E37CA96Eto merge
2B507d3e01583c8abff4Ca0486B918966643159a7c3e7adb5f36c7BD2E4D70ESystemcheck.Merged.dll
DF0096BD57D333CA140331F1C0D54c741A368593a4aac628423ab218B59BD0BBShell.dll
0c2BF36DD9CB3478C8D3DD7912112BCFC1F5D910845446E1ADDD1E769490287Ab4Stealer.dll
64cbbbff90fe84eda1a8c2f41a4D37B1D60E7136a02472A72C28B6ACADC2FCRansomware.dll
6A0c1f70af17BD925886F997BB43266AAA816F24315050550AFF5F0E473d059485Rootkit.dll
8d04215c281bd7be86f96fd1B24a418Ba1c497f5dee3ae1978E4B454B32307A1ResetrVival.dll

About the author

Suraj Cole He is a content specialist in technical writing about cybersecurity and information security. He wrote many amazing articles on cybersecurity concepts, with the latest trends in electronic awareness and ethical piracy. Learn more about “him”.

Read more:

Using the striker and the striker, the “Knights of the Wolf” attack “the new Russian agencies” aims to attack the new Russian agencies “

About the author

New XWorm V6 Variant Infected Windows Applications with Malicious Code

Leave a Comment