Description

XLoader malware continues to advance, with newer versions introducing stronger obfuscation and more sophisticated techniques to hide command-and-control (C2) communications. These updates make detection and analysis significantly more challenging for security teams. Enhancements introduced from version 8.1 onward primarily focus on protecting the malware’s code and masking its network activity through encryption and decoy infrastructure. Originally identified in 2016 as Formbook, an information-stealing trojan sold on underground forums, the malware was rebranded as XLoader in 2020 and continues to operate under a malware-as-a-service model. It retains its core capabilities, including stealing credentials from browsers, email clients, and FTP applications, logging keystrokes, and downloading additional payloads. Recent versions demonstrate major improvements in obfuscation. XLoader uses encrypted strings, runtime-decrypted code, and XOR-based techniques to hide logic and constants. Function decryption has become more complex, with parameters constructed dynamically in memory, making traditional signature-based detection ineffective. Additionally, the malware employs a heavily obfuscated RC4-based routine, where decryption parameters are encoded and resolved only during execution, complicating reverse engineering. On the network side, XLoader applies multiple layers of encryption using hardcoded keys, hashed C2 URLs, and Base64 encoding with modified formats. It distinguishes between data exfiltration and command retrieval using specific request identifiers. To evade detection, the malware uses decoy servers by embedding multiple encrypted C2 IP addresses and randomly communicating with them. This forces defenders to analyze several endpoints to identify real C2 servers. These continuous enhancements make XLoader a persistent and difficult-to-detect threat.