General
-
Target
52cae576b71c872d793937b5437db6c2a15324342d7d9c4101cd516dd4944cc6
-
Size
14.6MB
-
Sample
240118-bd4hzaadf3
-
MD5
cef5534159555f0df0b6e85715c19208
-
SHA1
b1d4a0ccf69b20ba3114696e6d7c126089080325
-
SHA256
52cae576b71c872d793937b5437db6c2a15324342d7d9c4101cd516dd4944cc6
-
SHA512
2c3e75871fd59db084747c078fa92050cb5ee3a47a307730f57cada79ae5ba00e037ffe8508e834eb4630d8f8cf1e8b5d50b88ae7027f66f55033ac92a511460
-
SSDEEP
393216:+SL+9qz88Ck+7q3p91JmBqfKV6egI7w13CT6Ztw6:+++9q4G331UofXeRw13CT6
Behavioral task
behavioral1
Sample
52cae576b71c872d793937b5437db6c2a15324342d7d9c4101cd516dd4944cc6.exe
Resource
win7-20231215-en
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot6782288559:AAGGaNp1iJda_iae5clmNAjmS8bZxRP8kMY/sendMessage?chat_id=6117387875
Targets
-
-
Target
52cae576b71c872d793937b5437db6c2a15324342d7d9c4101cd516dd4944cc6
-
Size
14.6MB
-
MD5
cef5534159555f0df0b6e85715c19208
-
SHA1
b1d4a0ccf69b20ba3114696e6d7c126089080325
-
SHA256
52cae576b71c872d793937b5437db6c2a15324342d7d9c4101cd516dd4944cc6
-
SHA512
2c3e75871fd59db084747c078fa92050cb5ee3a47a307730f57cada79ae5ba00e037ffe8508e834eb4630d8f8cf1e8b5d50b88ae7027f66f55033ac92a511460
-
SSDEEP
393216:+SL+9qz88Ck+7q3p91JmBqfKV6egI7w13CT6Ztw6:+++9q4G331UofXeRw13CT6
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-