General
-
Target
Xylex_Aimlock_V1.2.zip
-
Size
10.8MB
-
Sample
240510-rr8ylsdg48
-
MD5
30549c95f6486f311969a41672ca7370
-
SHA1
0fe8e72c88efefb44d5863146ef0b57033950bd1
-
SHA256
dc27c8f9f692b5e118ed3151d587dfab9ae74942655b989f9f05718b80c3a2ca
-
SHA512
35cee882767ca0f269a80133882b3fda7d5aec507d4b60df4f3964424d0fe6527462bc69cfeb05022bda2eb19ebcd8812d3e1a9d649758f80610de66e69cf794
-
SSDEEP
196608:JVpn3Ng0xjefZjC7FidbT4GQeULIaMl7cBdPojBm/ZDMdLqwaXnjGOTSGv9Aoq:JVpO0xefZjyidbT4nIaMKBdAtmxDMp9N
Behavioral task
behavioral1
Sample
Xylex_Aimlock_V1.2.zip
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
Xylex Aimlock/bin/launcher.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
https://github.com/ptsd9/script/releases/download/launcher/launcher.exe
Targets
-
-
Target
Xylex_Aimlock_V1.2.zip
-
Size
10.8MB
-
MD5
30549c95f6486f311969a41672ca7370
-
SHA1
0fe8e72c88efefb44d5863146ef0b57033950bd1
-
SHA256
dc27c8f9f692b5e118ed3151d587dfab9ae74942655b989f9f05718b80c3a2ca
-
SHA512
35cee882767ca0f269a80133882b3fda7d5aec507d4b60df4f3964424d0fe6527462bc69cfeb05022bda2eb19ebcd8812d3e1a9d649758f80610de66e69cf794
-
SSDEEP
196608:JVpn3Ng0xjefZjC7FidbT4GQeULIaMl7cBdPojBm/ZDMdLqwaXnjGOTSGv9Aoq:JVpO0xefZjyidbT4nIaMKBdAtmxDMp9N
Score10/10-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Xylex Aimlock/bin/launcher.exe
-
Size
10.9MB
-
MD5
15916166c043ce50f37b0a65f4c5d751
-
SHA1
1ef18a33a5c982514382aba053bee695281ca291
-
SHA256
09ff479a5a9d03f909fd4832b51dbafab4758717624852e697edc8eea26c4086
-
SHA512
1bac7ddd8dfd6b9debf75ea98025770db752889fac5b4b33c1a928097cc57f4f8662ee6173e88840ff9f08e325e2fff2238b6e18fa5b64e26ab9bfd1a7da439d
-
SSDEEP
196608:tH5gJpDqAlz2Jp5UfDC3njkY4KeNM++2Pfm/pf+xZTdnRSZZWKsnqrMWOzW0DjqT:l5gaAh2Jp5qC3njklM++2m/pWvTlRS79
Score9/10-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1