General
-
Target
Xylex-Premium.zip
-
Size
313B
-
Sample
240603-es6hnacc34
-
MD5
5595d61399855f5f1fc4ddcee0092f9d
-
SHA1
06bca6257f08144e4b89031a4289c3a0d4934b43
-
SHA256
bd8a66310436b855871114e5b70f7936e51a0afd2d8d5ab77a1a9ded69dc9c9f
-
SHA512
f201fd1945c16151acb6d41df6687562de35183a70f9322e5a828e76a45463fd00d3c688bd6f882883e23a6b0e014decfe283119dd1eef01d5de6a90f8c395e4
Static task
static1
Behavioral task
behavioral1
Sample
Executor/Xylex.bat
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Executor/Xylex.bat
Resource
win11-20240426-en
Malware Config
Extracted
https://github.com/xylexV5/xylexz/releases/download/vypix/xylex.exe
Targets
-
-
Target
Executor/Xylex.bat
-
Size
255B
-
MD5
aa385e3b4104f4529680f554cdc39b40
-
SHA1
00ab4c02495c60b0fce2ec3e6967b864e1156cae
-
SHA256
e0cf8ed28a7efbcb910b6e7d78641179e39a81fae787308eb6112745e59f1076
-
SHA512
ad06ece28950fa050775f899d0574c44ccf86912f465bd5e7c041b972173ef16a34a6857be8dfb1bd13163099d710b9fcf3c09a110f406e3a8608e71df16c66e
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
An obfuscated cmd.exe command-line is typically used to evade detection.
-