General
-
Target
xylex.exe
-
Size
10.9MB
-
Sample
240610-pn6mzawaqj
-
MD5
17ead4d89ed23763b2492c63facffd83
-
SHA1
7e24253ae355314029e90bad2f7a7b1fbe1d0e4b
-
SHA256
2b5f203f9173f23ad27fb186d24cdfca00d8b886e5376525c0d585eae5753a8b
-
SHA512
f25ea6207d840d5d0c25354cf85cdbcddea424c170ec2079fd0ff58baefee288813e9846a3c2502bd792a8774050e4cb3c4cdfc3b80ebe2fa380cb5f35f928a0
-
SSDEEP
196608:uhs2i0PA4mtSHeNvX+wfm/pf+xfdkRhZWKsnarIWOzW0DaqhH:IYvtSUvX+9/pWFGRDBsnarIWeRa2H
Behavioral task
behavioral1
Sample
xylex.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
xylex.exe
-
Size
10.9MB
-
MD5
17ead4d89ed23763b2492c63facffd83
-
SHA1
7e24253ae355314029e90bad2f7a7b1fbe1d0e4b
-
SHA256
2b5f203f9173f23ad27fb186d24cdfca00d8b886e5376525c0d585eae5753a8b
-
SHA512
f25ea6207d840d5d0c25354cf85cdbcddea424c170ec2079fd0ff58baefee288813e9846a3c2502bd792a8774050e4cb3c4cdfc3b80ebe2fa380cb5f35f928a0
-
SSDEEP
196608:uhs2i0PA4mtSHeNvX+wfm/pf+xfdkRhZWKsnarIWOzW0DaqhH:IYvtSUvX+9/pWFGRDBsnarIWeRa2H
Score10/10-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-