New XWorm RAT Phishing Campaign Exploits CVE-2018-0802 in Excel Attachments


A fresh phishing wave delivers XWorm RAT via business-themed emails with malicious Excel add-ins. Attackers exploit CVE-2018-0802 in Microsoft Equation Editor for initial code execution. This grants full remote control over Windows systems.

XWorm first appeared in 2022. Threat actors sell it on Telegram markets. The new variant uses fileless techniques to dodge antivirus scans. Emails mimic payment reviews, orders, or shipments to lure clicks on .XLAM files.

Once opened, an auto-loading OLE object triggers the old Equation Editor flaw. Shellcode downloads an HTA file from retrodayaengineering[.]icu. That HTA runs under mshta.exe and drops Base64 PowerShell code.

PowerShell grabs a JPEG from Cloudinary, extracts a .NET loader between markers, and runs it in memory. The loader fetches wwa.txt from r2.dev, rebuilds XWorm, and injects it into Msbuild.exe via process hollowing. XWorm then phones home to berlin101[.]com:6000 with AES encryption.

Examples of phishing emails used in the XWorm campaign (Source – Fortinet)

Fortinet researchers state: “XWorm is a multi-functional Remote Access Trojan first identified in 2022 that remains actively distributed, including through Telegram-based marketplaces.” They add: “The campaign relies on business-themed phishing lures and the legacy remote code execution vulnerability in the Microsoft Equation Editor.”

Infection Chain Table

StageActionEvasion Method
Phishing Email.XLAM attachmentBusiness lures
CVE-2018-0802OLE shellcode execUnpatched systems
HTA Download%APPDATA%\VA5.htamshta.exe blend-in
PowerShellExtracts .NET from JPGFileless loader
Process HollowMsbuild.exe injectionMemory-only RAT​

XWorm Capabilities

  • System commands: close, uninstall, update.
  • File ops: download, execute.
  • Plugins for keylog, screenshot, DDoS.
  • Credential theft and exfiltration.

Indicators of Compromise

  • Domains: retrodayaengineering[.]icu, pub-3bc1de741f8149f49bdbafa703067f24[.]r2[.]dev, berlin101[.]com:6000.
  • Files: HGG.hta, VA5.hta, optimized_MSI_lpsd9p.jpg, wwa.txt
  • Processes: mshta.exe, Msbuild.exe anomalies.

Defense Measures

Patch CVE-2018-0802 via Microsoft updates. Block .XLAM/HTA in email gateways. Constrain mshta.exe and PowerShell with AppLocker. Monitor for suspicious Cloudinary fetches or Msbuild spawns.

Priority DefenseActionTools
Patch Equation EditorApply MS17-010+Windows Update
Email FiltersBlock .XLAM macrosMimecast, Proofpoint
Process MonitoringAlert on mshta/PowerShellEDR like CrowdStrike
Network BlocksIOC domains/portsFirewall rules​

FAQ

What is the XWorm infection vector?

Phishing emails with .XLAM exploiting CVE-2018-0802.

How does it avoid detection?

Fileless chain with memory injection and AES C2.

What can XWorm do post-infection?

Remote control, plugins for steal/DDoS, file ops.

Key IOCs to block?

berlin101[.]com:6000, retrodayaengineering[.]icu.

How to protect endpoints?

Patch Office, constrain scripts, monitor Msbuild.exe.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages