General
-
Target
Xylex-Executor.exe
-
Size
6.9MB
-
Sample
240521-svsapsad23
-
MD5
6907dee88468ce667de369ff7f1df7ac
-
SHA1
b62452a0b18156ab1fc60c257874febdddce8824
-
SHA256
c9007e567fda7eab31763067aa1e2aaf95b3b0c8517c1c586fb31a2ffed99eae
-
SHA512
45ccb40caa3caddb0eb43f277b504dea11ff824eabc00e4ad693966937633c2a31df800d369a09bf7aa920088eb9ec49f3a534a57b47aacadb0643c15818028a
-
SSDEEP
98304:Qr+YDjWM8JEE1rpyamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRGYKJJcGhEG:Qr+Y0JeNTfm/pf+xk4dWRGtrbWOjgWyM
Malware Config
Targets
-
-
Target
Xylex-Executor.exe
-
Size
6.9MB
-
MD5
6907dee88468ce667de369ff7f1df7ac
-
SHA1
b62452a0b18156ab1fc60c257874febdddce8824
-
SHA256
c9007e567fda7eab31763067aa1e2aaf95b3b0c8517c1c586fb31a2ffed99eae
-
SHA512
45ccb40caa3caddb0eb43f277b504dea11ff824eabc00e4ad693966937633c2a31df800d369a09bf7aa920088eb9ec49f3a534a57b47aacadb0643c15818028a
-
SSDEEP
98304:Qr+YDjWM8JEE1rpyamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRGYKJJcGhEG:Qr+Y0JeNTfm/pf+xk4dWRGtrbWOjgWyM
-
Drops file in Drivers directory
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-