Cyber Security News

New Undetectable Batch Script Uses PowerShell and Visual Basic to Install XWorm

A novel malware delivery framework employing advanced obfuscation techniques has evaded detection by security tools for over 48 hours.

The attack chain centers around a Batch script that leverages PowerShell and Visual Basic Script (VBS) to deploy either the XWorm remote access trojan or AsyncRAT, marking a significant evolution in fileless attack methodologies, according to a recent tweet by VMRay.

Obfuscation and Multi-Stage Execution

The campaign begins with a heavily obfuscated Batch file designed to bypass static analysis tools.

Unlike traditional malicious scripts, this variant employs layered encoding and environmental checks to verify it’s executing on a real victim machine rather than a sandbox.

Once validated, the script activates PowerShell commands to fetch secondary payloads from remote servers while maintaining a minimal footprint on disk—a technique increasingly favored by ransomware operators and cyberespionage groups.

Researchers note the script’s second-stage payload incorporates Telegram’s API to exfiltrate system metadata and screenshots to attacker-controlled channels.

Script Info

This cloud-based command-and-control (C2) approach complicates network detection, as Telegram traffic often blends with legitimate user activity.

AI-Generated Code Patterns Raise Alarms

Forensic analysis revealed stylistic anomalies in the script’s construction, including unusually verbose comments and variable naming conventions inconsistent with human malware developers.

This has led investigators to hypothesize the attackers utilized generative AI tools like ChatGPT or Claude to refine their codebase, potentially automating portions of the development lifecycle.

Such AI-assisted malware creation could lower technical barriers for threat actors while increasing the sophistication of evasion tactics.

The malware’s final payload—XWorm or AsyncRAT—grants attackers comprehensive control over infected systems, enabling credential theft, lateral movement, and data exfiltration.

What distinguishes this campaign is its hybrid use of legacy scripting languages with modern cloud services, creating a polymorphic threat that adapts to enterprise environments. Security teams are advised to:

  1. Audit PowerShell execution policies and restrict unsigned script runs
  2. Implement behavioral analytics to detect anomalous process chains involving Batch, PowerShell, and VBS
  3. Monitor outbound connections to Telegram’s API endpoints, particularly those transmitting compressed images or system metadata

While the initial infection vector remains under investigation, the campaign underscores the limitations of signature-based detection against AI-enhanced threats.

Major antivirus vendors have begun deploying heuristic updates targeting the script’s unique obfuscation patterns, but experts warn that fully neutralizing this threat requires rethinking endpoint protection strategies around behavior monitoring rather than static file analysis.

As AI-generated malware becomes more prevalent, the cybersecurity community faces a paradigm shift—where defense mechanisms must evolve at machine learning speeds to counter automated attack toolkits.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most severe…

5 hours ago

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved into…

5 hours ago

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable new…

11 hours ago

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally

A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched Check…

12 hours ago

PingAM Java Agent Vulnerability Allows Attackers to Bypass Security

A critical security flaw (CVE-2025-20059) has been identified in supported versions of Ping Identity’s PingAM…

13 hours ago

New GitHub Scam Uses Fake “Mods” and “Cracks” to Steal User Data

A sophisticated malware campaign leveraging GitHub repositories disguised as game modifications and cracked software has…

14 hours ago