Weaponized ScreenConnect Delivers Xworm RAT

add a heading (17)

In a recent Advanced Continual Threat Hunt (ACTH) operation, Trustwave’s SpiderLabs uncovered a stealthy campaign where cybercriminals weaponized ScreenConnect, a legitimate remote management tool, to deliver the Xworm Remote Access Trojan (RAT) through a layered infection chain.

By using fake AI-related content and tampered digital certificates, the attackers managed to bypass many Endpoint Detection and Response (EDR) solutions, leaving manual threat hunting as the key method of detection.

Infection Chain Through Fake AI Sites

The campaign began with social engineering tactics. Victims were lured to a fake AI platform, gptgrok[.]ai, which redirected them to anhemvn6[.]com.

From there, users downloaded files named:

  • Creation_Made_By_GrokAI.mp4 Grok.com
  • Creation_Made_By_GoogleAI.mp4 Google.com
  • Creation_Made_By_SoraAI.mp4 OpenAI.com

These were not videos but disguised ScreenConnect installer files (ScreenConnect.ClientSetup.msi). By leveraging AI-related keywords, attackers gave credibility to their malicious campaign.

Code-Signing Certificate Abuse

figure 4. endpoint detection and response edr solution recognizing a valid signature for a modified screenconnect installer
A valid signature for a modified ScreenConnect installer.

Researchers discovered that the attackers abused Microsoft Authenticode code-signing certificates. Instead of altering the binary directly, they embedded malicious parameters within the digital signature. This allowed the installer to retain a valid signature, helping it evade tampering checks and user suspicion.

Once executed, the installer placed ScreenConnect in the Temp directory, configured it to run in hidden mode, and connected back to the attacker’s server. Icons and notifications were disabled, keeping the session invisible.

Fileless Execution with Python Payloads

During the remote session, a batch file named X-META Firebase_crypted.bat launched mshta.exe, which fetched 5btc.zip from anhemvn4[.]com. Inside were:

  • pw.exe (a renamed Python interpreter)
  • basse64.txt (an encoded payload)
figure 6. basse64.txt being recognized as a known stealer on virustotal
basse64.txt being recognized as a known stealer on VirusTotal.

Instead of writing malicious files to disk, the attackers used process hollowing in msedge.exe and chrome.exe. The Base64-encoded Python commands were pulled from a public GitHub repository, enabling stealthy, fileless execution of Xworm RAT.

Persistence and Long-Term Access

Persistence was achieved through a Windows Run key entry labeled “Windows Security,” pointing to backup.bat inside C:\xmetavip. This script re-executed pw.exe on every login with updated Base64 commands, fetching additional payloads like buquabua.txt.

The RAT also attempted credential harvesting by extracting stored browser passwords (Chrome, Edge, Firefox) and gathering system details via WMI queries.

GitHub-Hosted Malware and Final Payload

SpiderLabs noted that the GitHub repository hosted 11 obfuscated scripts, split between RAT loaders and persistence modules, created shortly before the attacks.

One final payload, Exppiyt.txt, contained a command-and-control (C2) IP (5[.]181[.]165[.]102:7705), which at the time was not flagged on VirusTotal.

Why This Matters

This campaign highlights a dangerous trend: attackers abusing legitimate software, AI branding, and digital signatures to bypass security solutions. Traditional EDR struggled to detect this, reinforcing the importance of skilled human threat hunters who can spot subtle anomalies.

The SpiderLabs report shows that blending automation with expert analysis remains the most effective way to expose advanced threats before they cause damage.

Indicator of Compromise (IoC) Hashes

File NameHash TypeHash Value
basse64.txtMD501cb34d362e688ea637582370b981402
backpuppure.txtMD5bcd902751a6bebda00a417c880937a25
abcdegia.txtMD52c0ac59a823ff90a179ba1144d142eb2
Nhwneafyp.txtMD5b33c6c77a7adda12e70766f02dbe8205
Hzcbmqnqwlv.txtMD58c2e092079906c5f59c7d9ee5e139bb5
Exppiyt.txtMD507c20378fc00934bf62a0986f8da58c8
x-metavn.txtMD54f17dbaf42ad92f56b24d33067a4d52f
purecoookielog.txtMD5f9f6e3826343cc9c11495852596593d4
exepurelog.txtMD5a1377a061b6da88d81bd104e85cb3101
cccccccccccccccccccccc.txtMD52fa26c5f869c26e17ce5617cce46efd0
buquabua.txtMD53baf507303132c234dba993cc804bd68
Btxeialrzt.exeMD5b7d98c93307eb75126d41bf40fa3d724
Exzdjz.dllMD594b3eab92f9ff8cd02bf4b5dbcc17e5c
ClassLibrary4.dllMD59b34d9dccd512ededa25ba0a2d13a875
Creation_Made_By_GrokAl.mp4 (Grok.com)SHA256e4a7853cacf4dfe42d465ee64e9b4b7aaaa229a34ac913e1fd2359c09578db5f
Temp\X-META Firebase_crypted.batSHA2565769ce40411966de7085fd4a551f65900d77d7badee2c818f16b54d0dc4f5e46
abcdegia.txtMD52c0ac59a823ff90a179ba1144d142eb2