General

  • Target

    xylex.exe

  • Size

    10.9MB

  • Sample

    240610-pn6mzawaqj

  • MD5

    17ead4d89ed23763b2492c63facffd83

  • SHA1

    7e24253ae355314029e90bad2f7a7b1fbe1d0e4b

  • SHA256

    2b5f203f9173f23ad27fb186d24cdfca00d8b886e5376525c0d585eae5753a8b

  • SHA512

    f25ea6207d840d5d0c25354cf85cdbcddea424c170ec2079fd0ff58baefee288813e9846a3c2502bd792a8774050e4cb3c4cdfc3b80ebe2fa380cb5f35f928a0

  • SSDEEP

    196608:uhs2i0PA4mtSHeNvX+wfm/pf+xfdkRhZWKsnarIWOzW0DaqhH:IYvtSUvX+9/pWFGRDBsnarIWeRa2H

Malware Config

Targets

    • Target

      xylex.exe

    • Size

      10.9MB

    • MD5

      17ead4d89ed23763b2492c63facffd83

    • SHA1

      7e24253ae355314029e90bad2f7a7b1fbe1d0e4b

    • SHA256

      2b5f203f9173f23ad27fb186d24cdfca00d8b886e5376525c0d585eae5753a8b

    • SHA512

      f25ea6207d840d5d0c25354cf85cdbcddea424c170ec2079fd0ff58baefee288813e9846a3c2502bd792a8774050e4cb3c4cdfc3b80ebe2fa380cb5f35f928a0

    • SSDEEP

      196608:uhs2i0PA4mtSHeNvX+wfm/pf+xfdkRhZWKsnarIWOzW0DaqhH:IYvtSUvX+9/pWFGRDBsnarIWeRa2H

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks