Skip to content

Exploit for the vulnerability null pointer derefrence to in XWorm RAT

Notifications You must be signed in to change notification settings

sqrtZeroKnowledge/XWorm-Trojan

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 

Repository files navigation

Intro:

During my investigation to analyze a sample of the XWorm Trojan, I decided to learn more about its behavior in the wild and examine its builder. After obtaining the builder, I discovered a security vulnerability that could assist security analysts in disrupting the builder's functionality or causing a Denial of Service (DoS) of the XWorm RAT C2 panel.

To exploit the vulnerability, one would need the IP address of the C2 and the port for the reverse connection. It is possible to build the exploit using Visual Studio and modify the indicators of compromise (IOCs) to suit your needs.

Disclaimer:

Please note that this is for malware analysis and educational purposes only. Do not use it against other computers. I am not responsible for any malicious usage that may result from this repository.

For those seeking additional samples, refer to the resources below:

PoC Validation : https://packetstormsecurity.com/files/170981/XWorm-Trojan-2.1-NULL-Pointer-Dereference.html

Malware Bazzar : https://bazaar.abuse.ch/browse/signature/Xworm/

Resources such as screenshots of the Trojan may prove helpful:

PoC

Crash PoC

Src: Cyble

XSS.IS FORUM

Developer Website

Warning: This source code contains DLL files that could be injected by stagers. Build and test only in an isolated virtual machine environment.

About

Exploit for the vulnerability null pointer derefrence to in XWorm RAT

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages