General

  • Target

    XyloTool.rar

  • Size

    5.8MB

  • Sample

    240626-f4z1pazglp

  • MD5

    23431e2bb1fdb82b98285ce1daa81223

  • SHA1

    fa5e1f6f33b8ef6244a5812f64c0aab1a78077d8

  • SHA256

    79fe80b6762a5ee29c76185cd062fcf832deb1620f04ddc4de50d3358ca9373f

  • SHA512

    84afc3b4867e601ea1703e7670aa4ac8e1c57335acfe1ed4733f745bc2a2d1efef40406a312a5bd6383908de2e436fcffe5e898c62b71a12a3b41149c028f149

  • SSDEEP

    98304:4Xuoid5KMbpyo/BoPsTAlZ7pZcRnGSatjD9s4E79L9Wta5XtAuFh5vJBt0Pf:OuoidRBoP5Z74RAC4SL9WMfncH

Malware Config

Targets

    • Target

      XyloTool.rar

    • Size

      5.8MB

    • MD5

      23431e2bb1fdb82b98285ce1daa81223

    • SHA1

      fa5e1f6f33b8ef6244a5812f64c0aab1a78077d8

    • SHA256

      79fe80b6762a5ee29c76185cd062fcf832deb1620f04ddc4de50d3358ca9373f

    • SHA512

      84afc3b4867e601ea1703e7670aa4ac8e1c57335acfe1ed4733f745bc2a2d1efef40406a312a5bd6383908de2e436fcffe5e898c62b71a12a3b41149c028f149

    • SSDEEP

      98304:4Xuoid5KMbpyo/BoPsTAlZ7pZcRnGSatjD9s4E79L9Wta5XtAuFh5vJBt0Pf:OuoidRBoP5Z74RAC4SL9WMfncH

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks