XWorm RAT Hides in PNG Image via Steganography Attack
SANS researcher uncovers multi-stage malware attack hiding XWorm payload inside a legitimate travel website image using steganography and obfuscated batch scripts.
A SANS Internet Storm Center analysis published today reveals an attack chain that stuffs XWorm remote access trojan inside a PNG image hosted on a compromised travel website. The technique combines batch script obfuscation with steganography to slip past security tools that focus on traditional executable analysis.
Xavier Mertens, senior ISC handler, picked apart a malicious .bat file that initially looks like a Chrome encryption bypass utility—the kind of script regularly shared on GitHub for legitimate purposes. The twist sits at the end of the code: instead of cleanly exiting, the script calls an additional function that kicks off the real payload delivery.
How the Attack Works
The infection starts with an email attachment containing a batch file. Opening it triggers a convoluted execution chain:
Stage 1: The batch script contains Base64-encoded data padded with junk characters. A custom decoding routine strips non-hex characters, reverses the string, and converts it to binary—a deliberate obfuscation layer designed to confuse automated analysis.
Stage 2: The decoded payload reaches out to hxxps://uniworldrivercruises-co[.]uk/optimized_MSI.png—a file hosted on what appears to be a legitimate travel company's domain. The PNG is a real image, but embedded within it sits shellcode bracketed by BaseStart- and -BaseEnd markers.
Stage 3: A .NET loader extracts the shellcode from between those markers and executes it in memory, dropping XWorm V7.0/V7.1 onto the system.
This approach mirrors techniques we covered in the GhostPoster campaign, where attackers hid malicious JavaScript inside Firefox extension logos using similar steganographic methods.
XWorm's Growing Footprint
XWorm has become a mainstay in the malware-as-a-service market since its 2022 debut. Version 6.0 launched in June 2025 with a fully rewritten codebase and modular plugin architecture. The RAT enables attackers to:
- Log keystrokes and capture screenshots
- Steal browser credentials, cookies, and autofill data
- Hijack Discord, Telegram, and MetaMask accounts
- Deploy additional payloads or ransomware modules
- Execute remote commands including system shutdown
The malware maintains persistence by creating a scheduled task named "Chromiumx2" that executes C:\Users\admin\AppData\Roaming\Chromiumx2.exe every minute. Command-and-control communications flow through a Telegram bot API endpoint, blending malicious traffic with normal encrypted chat data.
Indicators of Compromise
Defenders should watch for these IOCs from the analyzed sample:
File Hash:
- SHA256:
d99318c9b254b4fa5bf6f1dd15996dd50be0676dd84e822503fd273316eb9ba7
Network Indicators:
- Payload URL:
hxxps://uniworldrivercruises-co[.]uk/optimized_MSI.png - C2 server:
hxxp://178[.]16[.]53[.]209/buildingmoney.txt - Telegram bot endpoint with chat ID 6870183115
Persistence:
- Scheduled task: "Chromiumx2"
- Executable path:
C:\Users\admin\AppData\Roaming\Chromiumx2.exe
Why Steganography Matters for Defenders
Image-based payload delivery creates blind spots in security architectures. Most endpoint detection tools scrutinize executables, scripts, and Office documents—not PNG files fetched from seemingly benign domains. The travel website used in this attack likely has a clean reputation score, allowing the download to bypass URL filtering.
This technique isn't new. Chinese threat group Worok has deployed steganography-laden PNGs in espionage operations, and APT28 recently used similar methods combined with a Microsoft Office vulnerability to target European organizations.
Organizations relying solely on signature-based detection will miss these attacks. Behavioral monitoring that flags processes decoding and executing content from image files provides better coverage.
Defensive Recommendations
Security teams should consider these mitigations:
- Block untrusted .bat file execution through application control policies, particularly from email attachments
- Monitor PowerShell activity for Base64 decoding combined with web requests to image files
- Inspect scheduled task creation for suspicious persistence mechanisms
- Deploy EDR rules that detect in-memory shellcode execution following image file downloads
- Review outbound Telegram traffic for anomalous API calls that might indicate C2 activity
The full technical analysis is available on the SANS ISC diary. Network defenders should add the listed IOCs to their threat intelligence feeds.
For those building detection capabilities, the combination of batch script launching PowerShell, followed by PNG download and scheduled task creation, provides a reliable behavioral signature—even without knowing the specific malware variant in play.
Related Articles
SANS Analyst Tracks Malware Using Recycled PNG Payload
Xavier Mertens discovers 846 images reusing the same Base64 steganography technique to deliver .NET malware via Equation Editor exploits. Here's how defenders can hunt for copycats.
Feb 18, 2026ClickFix Campaign Deploys MIMICRAT Through Compromised BIN Sites
Elastic Security Labs uncovers ClickFix campaign abusing compromised bincheck.io to deliver MIMICRAT, a custom C++ RAT with SOCKS5 tunneling and token impersonation capabilities.
Feb 21, 2026GhostPoster Malware Hides in Firefox Extension Logos, Infects 50,000 Users
Security researchers uncover sophisticated steganography attack concealing malicious JavaScript within PNG logo files of 17 Firefox browser extensions.
Dec 17, 2025Matanbuchus 3.0 Loader Delivers AstarionRAT in Hands-On Intrusion
Huntress responds to ClickFix intrusion deploying Matanbuchus 3.0 and custom AstarionRAT. Attackers achieved lateral movement within 40 minutes.
Feb 25, 2026