General

  • Target

    Xylo RR.exe

  • Size

    12.0MB

  • MD5

    618c8d10cb697b64f0c8f979836c2565

  • SHA1

    20a38a23cb028a26ca85e00a481ba0d09c54efc2

  • SHA256

    a3a75a2e1c05aefb61498290fc213ab9226cfed7ecd9146903812810b7ba8f27

  • SHA512

    6fac2a05bcb90e429e513402d81c07cd66cde766ebfffb75d93bc33c9339d9cd325e8a6e58650e308bb3f97a22d6995f928d8e4b2637ac8d291ed32e34b9341d

  • SSDEEP

    196608:KQT0yWVIOuL2aeNTfm/pf+xk4dWRptrbWOjgrC:pBTOPVy/pWu4kRptrbvMrC

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Xylo RR.exe
    .exe windows:6 windows x64 arch:x64

    72c4e339b7af8ab1ed2eb3821c98713a


    Headers

    Imports

    Sections

  • [L�3�[.pyc