General
-
Target
xylos_working_executor.exe.exe
-
Size
10.2MB
-
Sample
240512-wm4kjscd22
-
MD5
0fe8e829f52a5a06b19994cb2cca3d2e
-
SHA1
c688faa795bf41dd4ec58ad4c7b8da105d483881
-
SHA256
3b54a47a9e90b6be9641c9b8c23898b673e194ddd41fe68545f7dfeb2e29f32d
-
SHA512
9bd3aa0bb1589a0db65825fd83ccb7d0481e94dbedff785f27c91792ec22c13b9138c1267ef67edbaf4bcfb2bb4977df3c6386f18a60da06658fd85774f0b532
-
SSDEEP
196608:lhqgbrdEkfcdqBA1HeT39IigwdeE9TFa0Z8DOjCdylLhYMfIGQfkdoXKh:rdEkfc4q1+TtIiFUY9Z8D8CcldlQNbX4
Behavioral task
behavioral1
Sample
xylos_working_executor.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
xylos_working_executor.exe.exe
-
Size
10.2MB
-
MD5
0fe8e829f52a5a06b19994cb2cca3d2e
-
SHA1
c688faa795bf41dd4ec58ad4c7b8da105d483881
-
SHA256
3b54a47a9e90b6be9641c9b8c23898b673e194ddd41fe68545f7dfeb2e29f32d
-
SHA512
9bd3aa0bb1589a0db65825fd83ccb7d0481e94dbedff785f27c91792ec22c13b9138c1267ef67edbaf4bcfb2bb4977df3c6386f18a60da06658fd85774f0b532
-
SSDEEP
196608:lhqgbrdEkfcdqBA1HeT39IigwdeE9TFa0Z8DOjCdylLhYMfIGQfkdoXKh:rdEkfc4q1+TtIiFUY9Z8D8CcldlQNbX4
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-