Cybersecurity

XWorm Returns in Advanced Phishing Campaign Leveraging Fileless Execution

Cyber Hunter Team
February 17, 2026
4 min read
XWorm Returns in Advanced Phishing Campaign Leveraging Fileless Execution

FortiGuard researchers uncover multi-stage infection chain ending in full remote compromise


Security researchers at FortiGuard have identified a new phishing campaign distributing an updated version of the XWorm Remote Access Trojan (RAT). Active since 2022 and widely sold in underground Telegram markets, XWorm provides full remote control over infected Windows systems.

This latest campaign demonstrates a highly structured infection chain — beginning with a simple email and ending with complete device compromise.

Stage 1: Business-Themed Phishing Email

The campaign uses legitimate-looking business emails, commonly themed around:

  • Payment review requests
  • Purchase orders
  • Banking documents
  • Shipping confirmations

The attachment is delivered as an Excel Add-in file (.XLAM). Once opened, the infection sequence begins.

Stage 2: Exploiting CVE-2018-0802

The malicious file contains an embedded OLE object exploiting CVE-2018-0802, a vulnerability in Microsoft Equation Editor.

Execution chain:

  • Launches EQNEDT32.EXE
  • Executes shellcode
  • Downloads an HTA file
  • Initiates PowerShell execution

Despite being an older vulnerability, it continues to be actively weaponized in current campaigns.

Stage 3: Fileless Execution

The HTA file contains obfuscated JScript that:

  • Decodes a Base64 payload
  • Downloads a seemingly benign JPG image
  • Extracts a hidden .NET module embedded within the image

The payload is unpacked directly in memory without writing to disk.

It then uses Process Hollowing to inject XWorm into Msbuild.exe — a legitimate Windows process frequently abused due to its .NET runtime compatibility.

Command and Control Communication

Upon execution, the malware sends a registration packet encrypted with AES to its C2 server:

berlin101[.]com:6000

The data collected includes:

  • Username
  • Operating system version
  • RAM details
  • GPU information
  • Installed antivirus
  • Administrative privileges
  • Presence of a camera

Capabilities of XWorm 7.2

The observed variant, UD_XWormClient 7.2, supports:

  • Credential and cookie theft
  • Keylogging
  • Webcam and microphone access
  • Ransomware functionality
  • DDoS operations
  • Plugin-based modular expansion (50+ modules)
  • Rootkit and bootkit features
  • Windows Defender disabling
  • Full file system and registry control

Plugins are stored in the Windows Registry and executed on demand, reinforcing its modular design.

Why This Campaign Is Significant

This operation demonstrates:

  • Fileless execution techniques
  • Exploitation of legacy vulnerabilities
  • Process Hollowing for evasion
  • AES-encrypted C2 traffic
  • Modular architecture for scalability

XWorm is no longer a basic commodity RAT — it functions as a full-featured post-exploitation framework.

Defensive Measures

Fortinet reports that:

  • FortiMail detects related emails as malicious
  • Updated antivirus signatures are available
  • Web filtering and IPS block malicious URLs
  • Content Disarm, and Reconstruction (CDR) neutralizes embedded OLE objects

Conclusion

The campaign reinforces several persistent realities in cyber defence:

  • Old vulnerabilities remain effective attack vectors
  • Phishing continues to be the primary entry point
  • Fileless and memory-resident techniques complicate detection

For organizations running Windows environments, a single phishing email may initiate a full compromise chain.

Indexed Under:
XWormParagon SolutionsPhishingFileless MalwareThreat Intelligence
0x//PROT_SEC
Status: Active
Secure Infrastructure

Ready to secure your future?

Our experts are ready to provide the intelligence and protection your business needs to stay ahead of evolving threats.