Cyber Security News

New Undetectable Batch Script Uses PowerShell and Visual Basic to Install XWorm

A novel malware delivery framework employing advanced obfuscation techniques has evaded detection by security tools for over 48 hours.

The attack chain centers around a Batch script that leverages PowerShell and Visual Basic Script (VBS) to deploy either the XWorm remote access trojan or AsyncRAT, marking a significant evolution in fileless attack methodologies, according to a recent tweet by VMRay.

Obfuscation and Multi-Stage Execution

The campaign begins with a heavily obfuscated Batch file designed to bypass static analysis tools.

Unlike traditional malicious scripts, this variant employs layered encoding and environmental checks to verify it’s executing on a real victim machine rather than a sandbox.

Once validated, the script activates PowerShell commands to fetch secondary payloads from remote servers while maintaining a minimal footprint on disk—a technique increasingly favored by ransomware operators and cyberespionage groups.

Researchers note the script’s second-stage payload incorporates Telegram’s API to exfiltrate system metadata and screenshots to attacker-controlled channels.

Script Info

This cloud-based command-and-control (C2) approach complicates network detection, as Telegram traffic often blends with legitimate user activity.

AI-Generated Code Patterns Raise Alarms

Forensic analysis revealed stylistic anomalies in the script’s construction, including unusually verbose comments and variable naming conventions inconsistent with human malware developers.

This has led investigators to hypothesize the attackers utilized generative AI tools like ChatGPT or Claude to refine their codebase, potentially automating portions of the development lifecycle.

Such AI-assisted malware creation could lower technical barriers for threat actors while increasing the sophistication of evasion tactics.

The malware’s final payload—XWorm or AsyncRAT—grants attackers comprehensive control over infected systems, enabling credential theft, lateral movement, and data exfiltration.

What distinguishes this campaign is its hybrid use of legacy scripting languages with modern cloud services, creating a polymorphic threat that adapts to enterprise environments. Security teams are advised to:

  1. Audit PowerShell execution policies and restrict unsigned script runs
  2. Implement behavioral analytics to detect anomalous process chains involving Batch, PowerShell, and VBS
  3. Monitor outbound connections to Telegram’s API endpoints, particularly those transmitting compressed images or system metadata

While the initial infection vector remains under investigation, the campaign underscores the limitations of signature-based detection against AI-enhanced threats.

Major antivirus vendors have begun deploying heuristic updates targeting the script’s unique obfuscation patterns, but experts warn that fully neutralizing this threat requires rethinking endpoint protection strategies around behavior monitoring rather than static file analysis.

As AI-generated malware becomes more prevalent, the cybersecurity community faces a paradigm shift—where defense mechanisms must evolve at machine learning speeds to counter automated attack toolkits.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

GRUB2 Flaws Expose Millions of Linux Devices to Exploitation

A critical set of 20 security vulnerabilities in GRUB2, the widely used bootloader for Linux…

3 minutes ago

Orange Communication Breached – Hackers Allegedly Claim 380,000 Email Records Exposed

Telecommunications provider Orange Communication faces a potential data breach after a threat actor using the pseudonym “Rey” claimed…

55 minutes ago

RSync Vulnerabilities Allow Hackers to Take Full Control of Servers – PoC Released

A series of critical security vulnerabilities in the widely-used Rsync file synchronization tool have been…

2 hours ago

Millions of WordPress Websites Vulnerable to Script Injection Due to Plugin Flaw

A critical security vulnerability in the Essential Addons for Elementor plugin, installed on over 2 million WordPress…

3 hours ago

2,850+ Ivanti Connect Secure Devices Exposed to Potential Cyberattacks

A sweeping cybersecurity alert has emerged as researchers identify 2,850+ unpatched Ivanti Connect Secure devices worldwide, leaving…

5 hours ago

US Employee Background Check Firm Hacked, 3 Million Records Exposed

DISA Global Solutions, a Houston-based provider of employee background checks and workplace safety services, disclosed…

5 hours ago