C:\Users\Friku\OneDrive\Desktop\ToxicEye-master\TelegramRAT\TelegramRAT\obj\Release\TelegramRAT.pdb
General
-
Target
DDOSprem.exe
-
Size
111KB
-
MD5
2c0d7dd8fc9b8c7fd03bf4f0c829c6d9
-
SHA1
713f7a8f209a080c2a1d7df2e64a0b7bd09c9e73
-
SHA256
ac3f5b28adad7993c233ae9affb1b510ef7ea90da15e957c7304eec1f821c8bf
-
SHA512
4926ccf0087e8ff9b1ebb2d0f9928378f4ead49db290e3f9fd35caadc12bdad8e569237ebc36b53a4f5f5f6aa87799f9c89847081ed3bf8863c9ab743b7098e7
-
SSDEEP
3072:/b4MbYUuQaS+T8sKXttm2tZ4OYmBGYPbxqH8QWazCrAZuWyN:PYUuQaS+T8sKXttm2tZ4ajbgt
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7116690824:AAFtTQVfXjhTbRv6mBTiSeareGJbUS1S-tE/sendMessage?chat_id=737203922
Signatures
-
Toxiceye family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource DDOSprem.exe
Files
-
DDOSprem.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 109KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ