General
-
Target
xylo.exe
-
Size
103.7MB
-
Sample
241123-hfv3yazqey
-
MD5
dab4537fabf4e4aaad81bcd06604d10a
-
SHA1
747821f500bd8b0cec39f557ce71d2b643ae56af
-
SHA256
24003b2eb1c9726d3a6b61c5a5817fce45a409772bdd60cc85299fa4feb5bdf7
-
SHA512
20aefc6744f1216a8ffc41795814ff20bb24a24e7c9d53e5ca54e173b3197d0428b86aaadcb844280d9986bc2b269f3ddbd25b6dd29e2a587b278e992076954a
-
SSDEEP
3145728:bnG5r7rS6xjKcBanL2qHO5iVAunGQbRe0zJcBxpZ2:6pnSWNaBHCin1XcBU
Behavioral task
behavioral1
Sample
xylo.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
xylo.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
xylo.exe
-
Size
103.7MB
-
MD5
dab4537fabf4e4aaad81bcd06604d10a
-
SHA1
747821f500bd8b0cec39f557ce71d2b643ae56af
-
SHA256
24003b2eb1c9726d3a6b61c5a5817fce45a409772bdd60cc85299fa4feb5bdf7
-
SHA512
20aefc6744f1216a8ffc41795814ff20bb24a24e7c9d53e5ca54e173b3197d0428b86aaadcb844280d9986bc2b269f3ddbd25b6dd29e2a587b278e992076954a
-
SSDEEP
3145728:bnG5r7rS6xjKcBanL2qHO5iVAunGQbRe0zJcBxpZ2:6pnSWNaBHCin1XcBU
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-