A Turkish Insurance Enthusiast, a Live GitHub Repository, and XWorm V6.0: How a Tax Document Lure Exposed a Multi-Vector Campaign
Actor email in GitHub commits, Turkish language in filenames, GitHub repo still serving payloads, 0/57 VT detection on the dropper
The domain backupallfresh2030[.]com was flagged by @skocherhan alongside four other XWorm C2 indicators. @smica83 had the sample -- James_Smith_Tax_Documents_2025.pdf .js, a JavaScript file disguised as a tax document, scoring 0/57 on VirusTotal. Seen from the UK on April 1.
We pulled the thread and found a Turkish-speaking threat actor who left their email address in GitHub commits, their native language in filenames, and their entire malware staging repository publicly accessible and still serving payloads as of this writing.
The Actor
The GitHub account flexhere687-art was created on the same day as the first malware upload. The commit history contains the email flexhere687@gmail[.]com. One of the staged executables is named sigortasevdalisi.exe -- Turkish for "insurance enthusiast." Combined with other Turkish-language artifacts in the tooling, this places the actor in Turkey with moderate confidence.
The GitHub repository xvxc- remains live and hosts five malware payloads:
dddd.exe-- XWorm V6.0 (compiled March 22, 2026)sigortasevdalisi.exe-- Named payload31.exe-- Unnamed variant- Additional staging files
GitHub has not removed the repository despite the payloads being openly accessible.
Three Delivery Vectors
The campaign uses three parallel delivery methods targeting different victim profiles:
Vector 1: JavaScript Tax Lure
James_Smith_Tax_Documents_2025.pdf .js -- the double extension exploits Windows' default hidden extension behavior. The victim sees what looks like a PDF. It's JavaScript.
The JS dropper uses string interleaving obfuscation -- characters of the malicious command are woven between garbage characters and reassembled at runtime. The deobfuscated payload calls PowerShell, which downloads a 14 MB ZIP from Filemail (a legitimate file-sharing service) containing a trojanized Python 3.12 installation. The Python loader decrypts AES+XOR encrypted shellcode and executes it in memory.
The Filemail link is still serving the payload.
Vector 2: BAT with UAC Bypass
Batch file droppers that bypass User Account Control to achieve elevated execution, then download payloads directly from the GitHub repository via raw URLs. Persistence is established through the Startup folder using the filename Microsys.exe.
Vector 3: Excel CVE-2017-11882
Weaponized Excel documents exploiting the Equation Editor vulnerability -- the same 2017 exploit we've seen in the SideWinder and WarMachine campaigns this week. Old vulnerability, still effective against unpatched systems.
Defender Evasion
The campaign's most aggressive evasion technique is Windows Defender exclusion abuse. Upon execution, the malware adds:
- The entire
C:\drive as a path exclusion .exe,.bat, and.ps1as extension exclusions
This effectively blinds Windows Defender to all executable activity on the system. Any subsequent payload -- XWorm, additional modules, lateral movement tools -- runs without real-time scanning.
Persistence Arsenal
Four persistence mechanisms ensure the malware survives reboots:
- Registry Run key as
RtkAudUService-- mimicking the legitimate Realtek Audio Universal Service. An administrator checking startup entries sees what looks like an audio driver. - Startup folder with
Microsys.exe-- a generic name that blends with legitimate Microsoft processes - Scheduled tasks via
schtasksfor timed re-execution - LOLBin abuse using
SyncAppvPublishingServer.vbs-- a legitimate Microsoft App-V script used as a living-off-the-land execution proxy
XWorm V6.0
The final payload is XWorm version 6.0, a full-featured remote access trojan with:
- DDoS attack capability
- Keylogger
- Screen capture
- File encryption (ransomware-capable)
- Process injection
- Plugin system for extensibility
- Telegram-based C2 notifications
- Credential harvesting from browsers and applications
- Hosts file manipulation for DNS hijacking
Related Infrastructure
@skocherhan documented additional C2 domains in the same campaign:
| Domain/IP | Purpose |
|---|---|
backupallfresh2030[.]com | Primary C2 |
king[.]authdrakesotware[.]com → 103.75.190[.]48 | Secondary C2 |
dd6qg4wn9ejpd[.]cloudfront[.]net → 3.170.185[.]8 | CloudFront C2 abuse |
nigga[.]ad0becloud[.]com → 31.44.4[.]127 | Fake Adobe domain |
marchcap28[.]blogspot[.]com | Blogspot dead drop |
aprilfoolclpa[.]blogspot[.]com | Blogspot dead drop |
The campaign abuses three legitimate platforms for infrastructure: GitHub for payload staging, Filemail for payload delivery, CloudFront for C2 traffic, and Blogspot for command dead drops. This multi-platform abuse strategy means no single takedown request disrupts the entire operation.
Indicators of Compromise
Network Indicators
backupallfresh2030[.]com(primary C2)king[.]authdrakesotware[.]com/103.75.190[.]48dd6qg4wn9ejpd[.]cloudfront[.]net/3.170.185[.]8nigga[.]ad0becloud[.]com/31.44.4[.]127marchcap28[.]blogspot[.]comaprilfoolclpa[.]blogspot[.]com- GitHub:
flexhere687-art/xvxc-(STILL LIVE)
File Indicators
James_Smith_Tax_Documents_2025.pdf .js— SHA256:333aae0b09f9a443c3fd9b381f04f684e87aa6ad8fc55f8ac3293e8df80b45d5(0/57 VT)dddd.exe— XWorm V6.0 (compiled 2026-03-22)
Actor Indicators
- Email:
flexhere687@gmail[.]com - Language: Turkish ("sigortasevdalisi" = insurance enthusiast)
- GitHub:
flexhere687-art
Behavioral Indicators
- Registry Run key
RtkAudUService(mimics Realtek audio) - Defender exclusions: entire
C:\+.exe/.bat/.ps1extensions SyncAppvPublishingServer.vbsLOLBin execution- Startup folder
Microsys.exe
Detection
Seven YARA rules and nine Suricata signatures are available on our GitHub:
h/t @skocherhan and @smica83 for the IOCs and sample.