XWorm RAT Dominates the Malware-as-a-Service Landscape with 174% Increase in Detections

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer
Key Takeaways
  • Rapid threat growth: XWorm RAT has surged to become the third most prevalent global threat, with enterprise detections up 174% over the past year.
  • Stealth techniques used: The malware employs Living-off-the-Land tactics, abusing legitimate Microsoft utilities to execute malicious payloads in-memory.
  • Exploit-driven attacks: Operating within a MaaS model, XWorm exploits critical path-traversal vulnerabilities to bypass traditional security defenses and facilitate data exfiltration.

XWorm RAT recently became the third most-detected global threat, as this highly modular tool is aggressively outpacing legacy remote access trojans (RATs), cybersecurity researchers say. By offering advanced enterprise-scale disruption capabilities at a low acquisition cost, XWorm entirely redefines the modern malware-as-a-service (MaaS) marketplace.

In-Memory Execution and Evasion Tactics

XWorm operates as a highly lightweight, modular, and stealthy malware, a recent Trellix analysis revealed. In 2025, XWorm detections were 4.3x higher than the year before, now accounting for a significant share of the 2 million+ sandbox sessions analyzed annually by security researchers.

XWorm saw a staggering 174% surge in detections over the last year, while legacy tools like Remcos and AgentTesla dropped to the 7th and 10th place, respectively, Trellix said, citing the ANY.RUN 2025 Threat Report.

Top malware families in 2025 | Source: ANY.RUN
Top malware families in 2025 | Source: ANY.RUN

Recent infection chains weaponize ZIP/RAR path-traversal vulnerabilities, such as the WinRAR CVE-2025-8088 exploit, frequently delivered through platforms like Discord via deceptive archives.

XWorm infection chain overview | Source: Trellix
XWorm infection chain overview | Source: Trellix

Upon initial access, the malware initiates a complex, multi-stage deployment utilizing "Living off the Land" (LOTL) techniques. The primary mechanism abuses trusted system binaries, specifically Aspnet_compiler.exe, through reflective DLL injection. By allocating space within the memory of a legitimate process, the core payload runs entirely without touching the disk, effectively neutralizing standard signature-reliant endpoint protections.

New Telegram handles distributing XWorm v7.x  | Source: Trellix
New Telegram handles distributing XWorm v7.x  | Source: Trellix

Trellix analysis mentions a 7-stage execution flow:

  1. Initial access: Phishing email with a ZIP attachment, such as "MFEQuotation Work request for NCSOCSO.zip".
  2. The JavaScript dropper: Opening the enclosed .JS file triggers wscript.exe and attempts to connect to a remote server (e.g., kolanga[.]cc).
  3. Encrypted PowerShell staging: The downloaded PowerShell script, which serves as a secure container, has a large block of encrypted data and a hardcoded AES decryption key.
  4. LOTL: The script executes with the -nop and -ep bypass switches to evade safety checks and launches the trusted Microsoft application Aspnet_compiler.exe.
  5. In-Memory execution: The script performs Reflective DLL Injection to insert the XWormClient Payload.
  6. Data capture: The malware captures every keystroke and saves it to a hidden log file in the %TEMP% folder.
  7. Data exfiltration: At regular intervals, the encrypted logs are sent to the attacker's command-and-control (C2) server.

Escalating Cybersecurity Threats

The capabilities of this RAT include password harvesting, unauthorized process modifications, coordinated DDoS attacks, and monitoring files, registry, screen, web browser tabs, webcams, and microphones. Because XWorm successfully combines advanced persistent threat (APT) deception tactics with extreme commercial accessibility (averaging a $500 lifetime subscription), network defenders must:

Earlier this year, the ANY.RUN report outlined that Lumma and XWorm led malware family rankings, and CloudSek reported a trojanized version of the XWorm RAT builder spread through GitHub, Telegram, and file-sharing platforms to compromise over 18,000 devices globally.

In 2025, the new Brazilian malware Caminho Loader employed steganography in an October global campaign deploying Remcos RAT, XWorm, and Katz Stealer, and UAC-0173 deployed DCRAT and XWORM Stealer against Ukrainian notaries in February.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: