Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT
    Cybersecurity

    Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT

    adminBy adminMarch 7, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Cybersecurity researchers have disclosed details of a multi-stage malware campaign that uses batch scripts as a pathway to deliver various encrypted remote access trojan (RATs) payloads that correspond to XWorm, AsyncRAT, and Xeno RAT.

    The stealthy attack chain has been codenamed VOID#GEIST by Securonix Threat Research.

    At a high level, the obfuscated batch script is used to deploy a second batch script, stage a legitimate embedded Python runtime, and decrypt encrypted shellcode blobs, which are executed directly in memory by injecting them into separate instances of “explorer.exe” using a technique called Early Bird Asynchronous Procedure Call (APC) injection.

    “Modern malware campaigns increasingly shift from standalone executables toward complex, script-based delivery frameworks that closely mimic legitimate user activity,” researchers Akshay Gaikwad, Shikha Sangwan, and Aaron Beardslee said in a technical report shared with The Hacker News.

    “Rather than deploying traditional PE binaries, attackers leverage modular pipelines comprising batch scripts for orchestration, PowerShell for stealthy staging, legitimate embedded runtimes for portability, and raw shellcode executed directly in memory for persistence and control.”

    This fileless execution mechanism minimizes disk-based detection opportunities, thereby allowing the threat actors to operate within compromised systems without triggering security alerts. What’s more, the approach offers an extra advantage in that these individual stages appear harmless in isolation and resemble regular administrative activity.

    The starting point of the attack is a batch script that’s fetched from a TryCloudflare domain and distributed via phishing emails. Once launched, it deliberately avoids taking steps to escalate privileges and leverages the permission rights of the currently logged-in user to establish an initial foothold, while blending into seemingly innocuous administrative operations.

    The initial stage serves as a launchpad to display a decoy PDF by launching Google Chrome in full-screen. The displayed financial document or invoice serves as a visual distraction to conceal what’s happening behind the scenes. This includes launching a PowerShell command to re-execute the original batch script, such as using the -WindowStyle Hidden parameter, to avoid displaying a console window.

    To ensure persistence across system reboots, an auxiliary batch script is placed in the Windows user’s Startup directory so that it’s automatically executed every time the victim logs in to the system. The absence of more intrusive persistence methods is intentional, as it reduces the forensic footprint.

    “Technically, this persistence method operates entirely within the current user’s privilege context. It does not modify system-wide registry keys, create scheduled tasks, or install services,” the researchers said. “Instead, it relies on standard user-level startup behavior, which requires no elevation and generates minimal security friction. This design choice reduces the likelihood of triggering privilege escalation prompts or registry-monitoring alerts.”

    The next phase begins with the malware reaching out to a TryCloudflare domain to fetch additional payloads in the form of ZIP archives that contain multiple files –

    • runn.py, a Python-based loader script responsible for decrypting and injecting encrypted shellcode payload modules into memory
    • new.bin, an encrypted shellcode payload corresponding to XWorm
    • xn.bin, an encrypted shellcode payload corresponding to Xeno RAT
    • pul.bin, an encrypted shellcode payload corresponding to AsyncRAT 
    • a.json, n.json, and p.json, key files containing the decryption keys required by the Python loader to dynamically decrypt the shellcode at runtime

    Once the files are extracted, the attack sequence deploys a legitimate embedded Python runtime directly from python[.]org. This step offers several advantages. For starters, it eliminates any dependency on the system. As a result, the malware can continue to operate even if the infected endpoint does have Python installed.

    “From the attacker’s perspective, the objectives of this stage are portability, reliability, and stealth,” Securonix said. “By embedding a legitimate interpreter into the staging directory, the malware transforms itself into a fully self-contained execution environment capable of decrypting and injecting payload modules without relying on external system components.”

    The main goal of the attack is to leverage the Python runtime to launch “runn.py,” which then decrypts and runs the XWorm payload using Early Bird APC injection. The malware also makes use of a legitimate Microsoft binary, “AppInstallerPythonRedirector.exe,” to invoke Python and launch Xeno RAT. In the last stage, the Python loader uses the same injection mechanism to launch AsyncRAT.

    The infection chain culminates with the malware transmitting a minimal HTTP beacon back to attacker-controlled C2 infrastructure hosted on TryCloudflare to confirm the digital break-in. It’s currently not known who the targets of the attack were, and if there have been any successful compromises.

    “This repeated injection pattern reinforces the modular architecture of the framework. Instead of delivering a single monolithic payload, the attacker deploys components incrementally, improving flexibility and resilience,” Securonix said. “From a detection standpoint, repeated process injection into explorer.exe within short time windows is a strong behavioral indicator that correlates across stages of the attack.”

    AsyncRAT Delivering Malware MultiStage RAT VOIDGEIST Xeno XWorm
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleOpenAI’s big ChatGPT Instant Checkout plan just changed
    Next Article Most people buy the wrong Raspberry Pi for what they actually need it to do
    admin
    • Website

    Related Posts

    Fake Claude Code install guides push infostealers in InstallFix attacks

    March 7, 2026

    FBI Investigating ‘Suspicious’ Cyber Activity on System Holding Sensitive Surveillance Information

    March 7, 2026

    New cyber module strengthens risk planning for health organizations

    March 7, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Fake Claude Code install guides push infostealers in InstallFix attacks

    March 7, 2026

    Admiring Our Heroes for International Women’s Day: Five Women In Tech That EFF Admires

    March 7, 2026

    Search and Gemini may converge, or diverge further

    March 7, 2026

    I’ve done extensive testing on the Galaxy S26 Ultra’s 8-bit display, and it isn’t a big problem, but it could be

    March 7, 2026
    Categories
    • Blogging (34)
    • Cybersecurity (647)
    • Privacy & Online Earning (93)
    • SEO & Digital Marketing (411)
    • Tech Tools & Mobile / Apps (788)
    • WiFi / Internet & Networking (114)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Fake Claude Code install guides push infostealers in InstallFix attacks

    March 7, 2026

    Admiring Our Heroes for International Women’s Day: Five Women In Tech That EFF Admires

    March 7, 2026

    Search and Gemini may converge, or diverge further

    March 7, 2026
    Most Popular
    • Fake Claude Code install guides push infostealers in InstallFix attacks
    • Admiring Our Heroes for International Women’s Day: Five Women In Tech That EFF Admires
    • Search and Gemini may converge, or diverge further
    • I’ve done extensive testing on the Galaxy S26 Ultra’s 8-bit display, and it isn’t a big problem, but it could be
    • FBI Investigating ‘Suspicious’ Cyber Activity on System Holding Sensitive Surveillance Information
    • Vivo teases the most powerful camera phone ever with a 400mm telephoto lens accessory, but it is just a gimmick?
    • Most people buy the wrong Raspberry Pi for what they actually need it to do
    • Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.