Common modules focus on searching local files, dumping browser passwords, taking screenshots, and logging keystrokes.

Android and iOS variants have been used to track device location and steal iPhone backups from connected computers.

As detailed by security researchers at ESET and Palo Alto Networks , X-Agent is designed for long-term espionage.