Skip to content Dark Web Informer - Cyber Threat Intelligence
IOC

IOC Alert: XWorm Command-and-Control Infrastructure

📖 Overview
A domain-based indicator has been identified leveraging Portmap.io services for remote port forwarding, enabling XWorm malware command-and-control communications. Portmap’s free tunneling service is often abused by threat actors to disguise botnet traffic behind legitimate infrastructure. Confidence is assessed at 100%.


📌 Key Details

FieldInformation
TypeDomain
IndicatorSHADOWii0000-45869.portmap[.]host
Threat TypeBotnet C2
Malwarewin.xworm
Confidence100%
Date26 Sep 2025 – 12:00:19 UTC
TagsC2, Domain, Triage, XWorm
ReporterDonPasci

🔎 URLScan Result
Verdict Score: 0
Page Title: Portmap.io – free port forwarding solution
Screenshot: https://urlscan.io/screenshots/019985e9-811e-756d-8d10-a74d5141cab8.png
Result: https://urlscan.io/result/019985e9-811e-756d-8d10-a74d5141cab8/


📡 Related Intelligence
DNS A Record: 193[.]161[.]193[.]99
Certificate Transparency: https://crt.sh/?q=SHADOWii0000-45869.portmap.host
VirusTotal Report: https://www.virustotal.com/gui/domain/SHADOWii0000-45869.portmap.host
URLScan Domain Overview: https://urlscan.io/domain/SHADOWii0000-45869.portmap.host
DNS Analytics: https://dnslytics.com/domain/SHADOWii0000-45869.portmap.host


🛡️ Defensive Guidance

  • Block SHADOWii0000-45869.portmap[.]host and associated IP (193[.]161[.]193[.]99) at DNS, proxy, and endpoint levels.
  • Monitor for Portmap-related tunneling services in outbound traffic.
  • Hunt for XWorm persistence and payload artifacts across endpoints.
  • Inspect certificate transparency logs for additional Portmap subdomains tied to malicious activity.

⚠️ The use of Portmap tunneling highlights how adversaries exploit legitimate proxy services for stealthy C2 communication.

Latest