General

  • Target

    Xylex-Premium.zip

  • Size

    313B

  • Sample

    240603-es6hnacc34

  • MD5

    5595d61399855f5f1fc4ddcee0092f9d

  • SHA1

    06bca6257f08144e4b89031a4289c3a0d4934b43

  • SHA256

    bd8a66310436b855871114e5b70f7936e51a0afd2d8d5ab77a1a9ded69dc9c9f

  • SHA512

    f201fd1945c16151acb6d41df6687562de35183a70f9322e5a828e76a45463fd00d3c688bd6f882883e23a6b0e014decfe283119dd1eef01d5de6a90f8c395e4

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://github.com/xylexV5/xylexz/releases/download/vypix/xylex.exe

Targets

    • Target

      Executor/Xylex.bat

    • Size

      255B

    • MD5

      aa385e3b4104f4529680f554cdc39b40

    • SHA1

      00ab4c02495c60b0fce2ec3e6967b864e1156cae

    • SHA256

      e0cf8ed28a7efbcb910b6e7d78641179e39a81fae787308eb6112745e59f1076

    • SHA512

      ad06ece28950fa050775f899d0574c44ccf86912f465bd5e7c041b972173ef16a34a6857be8dfb1bd13163099d710b9fcf3c09a110f406e3a8608e71df16c66e

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • An obfuscated cmd.exe command-line is typically used to evade detection.

MITRE ATT&CK Enterprise v15

Tasks