General
-
Target
7c945b70315e7b1dfa807549c90712e0792380a418c13d56dbd853e4ddddecc7
-
Size
13.8MB
-
Sample
240118-bjdjqshggm
-
MD5
d5e0c1a6916a3424abec42a62e9af859
-
SHA1
1828fb74c0e0f54dad6e06df6926c8eb58c3a203
-
SHA256
7c945b70315e7b1dfa807549c90712e0792380a418c13d56dbd853e4ddddecc7
-
SHA512
fc045d983c40c7056404416d4dd8241c86e1ec1c05e802b17212f93f3cc602d63099316e4ab78a96e4e5fadac64042b3c281871ce2cb1cca1e28f8e5763486d6
-
SSDEEP
393216:Ugan8IDOJCnwCpvC3VyiaRiGRObwZngWv:HHxJuwCk3VfkiGwbMvv
Static task
static1
Behavioral task
behavioral1
Sample
7c945b70315e7b1dfa807549c90712e0792380a418c13d56dbd853e4ddddecc7.exe
Resource
win7-20231215-en
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot6782288559:AAGGaNp1iJda_iae5clmNAjmS8bZxRP8kMY/sendMessage?chat_id=6117387875
Targets
-
-
Target
7c945b70315e7b1dfa807549c90712e0792380a418c13d56dbd853e4ddddecc7
-
Size
13.8MB
-
MD5
d5e0c1a6916a3424abec42a62e9af859
-
SHA1
1828fb74c0e0f54dad6e06df6926c8eb58c3a203
-
SHA256
7c945b70315e7b1dfa807549c90712e0792380a418c13d56dbd853e4ddddecc7
-
SHA512
fc045d983c40c7056404416d4dd8241c86e1ec1c05e802b17212f93f3cc602d63099316e4ab78a96e4e5fadac64042b3c281871ce2cb1cca1e28f8e5763486d6
-
SSDEEP
393216:Ugan8IDOJCnwCpvC3VyiaRiGRObwZngWv:HHxJuwCk3VfkiGwbMvv
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-