Contact

JScript to PowerShell: Breaking Down a Loader Delivering XWorm and Rhadamanthys

NetmanageIT OpenCTI - opencti.netmanageit.com

JScript to PowerShell: Breaking Down a Loader Delivering XWorm and Rhadamanthys



SUMMARY :

This analysis examines a sophisticated malware loader that utilizes JScript to launch obfuscated PowerShell code, ultimately delivering payloads such as XWorm and Rhadamanthys. The loader employs geofencing tactics, targeting victims in the United States with XWorm RAT, while deploying Rhadamanthys stealer to users outside the U.S. The attack chain involves multiple stages of obfuscation and deobfuscation, including decimal encoding and string manipulation. The final payload is injected into RegSvcs.exe using reflective loading techniques. The loader also performs various cleanup actions to evade detection and remove traces of its activity. Both XWorm and Rhadamanthys are advanced malware variants with capabilities ranging from DDoS attacks to cryptocurrency theft.

OPENCTI LABELS :

xworm,rhadamanthys,jscript


Open in NetmanageIT OpenCTI Public Instance with below link!


Use public read only username and password on login page.

NOTE : Use Public READ only user credentials on login page banner.


JScript to PowerShell: Breaking Down a Loader Delivering XWorm and Rhadamanthys