General

  • Target

    https://cdn.discordapp.com/attachments/1237806821415063592/1238564122484932618/Xylex-Executor.zip?ex=663fbe3a&is=663e6cba&hm=a492bcbfb6410190fb368b3a361704c3350219f653ab2c352cdf338d16198ce9&

  • Sample

    240510-x88l3agf58

Score
8/10

Malware Config

Targets

    • Target

      https://cdn.discordapp.com/attachments/1237806821415063592/1238564122484932618/Xylex-Executor.zip?ex=663fbe3a&is=663e6cba&hm=a492bcbfb6410190fb368b3a361704c3350219f653ab2c352cdf338d16198ce9&

    Score
    8/10
    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks