Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Xworm campaign shows a change to fileless malware and in-memory theft strategy
    Security

    Xworm campaign shows a change to fileless malware and in-memory theft strategy

    PineapplesUpdateBy PineapplesUpdateSeptember 29, 2025No Comments1 Min Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Xworm campaign shows a change to fileless malware and in-memory theft strategy
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Xworm campaign shows a change to fileless malware and in-memory theft strategy

    Built to hide, move and continue on the target, Xworm rat was deployed to misbehave a downloader and execute a valid windows API to bring and execute API Hashing, “Anhid” calls, calls, calls, calls, calls, heavy obecation and encryption with levels with anti-inflammation techniques.

    Multi-stage attack hides the rat within the spreadsheet

    The “Ole10NATive” stream extracted from the .XLAM collection in the transition email hides an encrypted shellcode drop. Forcepoint analysts used XORESERCH And to find the execution of the SCDBG shellcode and to follow it, the API disclosure the call that downloads a .NET executable for the victim’s application data folder.

    “. When analyzing the compiled bayonaries, it is good to focus on classes/methods using ‘drawing’,” Kumar told“The reason for this is that a lot of .NET malware will load a bit of a bit or object from its resource section and load the next step into memory.”

    He unpaclies .NET’s executable then unpacks a byte array and uses a stegnaography image resource to load a second-stage DLL into memory, which in turn reflects a third-step module-Xworm rat. Each stage is loaded or executed in memory, on-disc artifacts are reduced and efforts to detect are complicated.

    Campaign change fileless inmemory Malware shows Strategy Theft Xworm
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleFirst look. Tekkachchan
    Next Article Microsoft launched ‘Vibe Working’ in Excel and Word
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026
    Startups

    Instantly change the color of your nails with digital nail polish for the first time at CES 2026

    January 7, 2026
    Startups

    AI kills the cloud-first strategy: why hybrid computing is now the only way forward?

    December 30, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2026 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.