Site icon Check Point Blog

Cracking XLoader with AI: How Generative Models Accelerate Malware Analysis

Key Highlights
The challenge: an analyst’s nightmare

XLoader has been evolving since 2020 as a successor to the FormBook malware family. It specializes in stealing information, hiding its code behind multiple encryption layers, and constantly morphing to evade antivirus tools and sandboxes.

Traditional malware analysis is slow and manual—requiring experts to unpack binaries, trace functions, and build decryption scripts by hand. Even sandboxing (running malware in a controlled environment) doesn’t help much, because XLoader decrypts itself only while running and detects when it’s being monitored, keeping its real code hidden.

This makes XLoader a prime example of modern malware that uses time, complexity, and obfuscation as weapons.

Read Check Point Research’s full report

The turning point: AI-assisted reverse engineering

Check Point Research turned to AI-driven malware analysis to speed up and automate the process. Using ChatGPT (GPT-5), we combined two complementary workflows:

  1. Cloud-based static analysis: Exported data from IDA Pro (disassembly, decompiled functions, and strings) and let the AI analyze it in the cloud. The model identified encryption algorithms, recognized data structures, and even generated Python scripts to decrypt sections of code.
  2. MCP-assisted runtime analysis: Connected the AI to a live debugger to extract runtime values such as encryption keys, decrypted buffers, and in-memory C2 data.

This hybrid AI workflow turned tedious manual reverse engineering into a semi-automated process that’s faster, repeatable, and easy to share across teams.

What the AI uncovered

Using the new workflow, we achieved concrete results:

In short, AI helped unpack how XLoader hides, communicates, and protects itself, crucial insights for improving detection and prevention. These findings directly strengthened our threat intelligence feeds, allowing Check Point protections to update faster and more accurately.

Why AI is a game changer in cyber security

AI doesn’t replace malware analysts. Rather, it supercharges them.

Generative AI is now a powerful tool for incident response, reverse engineering, and threat hunting.

The bigger picture

Malware authors will likely adapt to AI-driven analysis, but the defensive advantage is clear: AI allows defenders to respond in near real time to complex, encrypted threats like XLoader.

At Check Point Research, we continue to refine these workflows, combining AI automation, scripting, and runtime validation, to scale malware analysis and threat detection.

Protection and coverage

Check Point Threat Emulation and Harmony Endpoint provide comprehensive coverage of attack tactics, file types, and operating systems and protect against the attacks and threats described in this report.

Read Check Point Research’s full report

Exit mobile version