General

  • Target

    file.exe

  • Size

    147KB

  • Sample

    240302-bqc7jsgd87

  • MD5

    27d11d6ddc6f80eed3b4fbd411b82014

  • SHA1

    2c5f9eb7c3f8bf0b9cb9f05bc192ab37cb9384d8

  • SHA256

    d56b2acb792a0e9e636c40190064525352293bbabd04d31a89978c0c167f50aa

  • SHA512

    e4cda09a174769cfbb665c51410bbe9d40a0896148ad600bfd78195f90d793e96b0a2d149c709491af60381533c3c91b816f04875433849e22e1eda4d9484eff

  • SSDEEP

    3072:lVHeqbQCpPCJc2L/BDLzEPzKcOP9aWvqXp087OsWVOQ28EwDx30kAmQiL:lVH3u7xsPzKhP9NSXJ7OLwV8EwVXQ

Malware Config

Extracted

Family

toxiceye

C2

https://api.telegram.org/bot7040511851:AAEjBKSxADGWlNtLxaKpotGtf53NUQ1UgAo/sendMessage?chat_id=6226815698

Targets

    • Target

      file.exe

    • Size

      147KB

    • MD5

      27d11d6ddc6f80eed3b4fbd411b82014

    • SHA1

      2c5f9eb7c3f8bf0b9cb9f05bc192ab37cb9384d8

    • SHA256

      d56b2acb792a0e9e636c40190064525352293bbabd04d31a89978c0c167f50aa

    • SHA512

      e4cda09a174769cfbb665c51410bbe9d40a0896148ad600bfd78195f90d793e96b0a2d149c709491af60381533c3c91b816f04875433849e22e1eda4d9484eff

    • SSDEEP

      3072:lVHeqbQCpPCJc2L/BDLzEPzKcOP9aWvqXp087OsWVOQ28EwDx30kAmQiL:lVH3u7xsPzKhP9NSXJ7OLwV8EwVXQ

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • ToxicEye

      ToxicEye is a trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks