General
-
Target
file.exe
-
Size
147KB
-
Sample
240302-bqc7jsgd87
-
MD5
27d11d6ddc6f80eed3b4fbd411b82014
-
SHA1
2c5f9eb7c3f8bf0b9cb9f05bc192ab37cb9384d8
-
SHA256
d56b2acb792a0e9e636c40190064525352293bbabd04d31a89978c0c167f50aa
-
SHA512
e4cda09a174769cfbb665c51410bbe9d40a0896148ad600bfd78195f90d793e96b0a2d149c709491af60381533c3c91b816f04875433849e22e1eda4d9484eff
-
SSDEEP
3072:lVHeqbQCpPCJc2L/BDLzEPzKcOP9aWvqXp087OsWVOQ28EwDx30kAmQiL:lVH3u7xsPzKhP9NSXJ7OLwV8EwVXQ
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240221-en
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7040511851:AAEjBKSxADGWlNtLxaKpotGtf53NUQ1UgAo/sendMessage?chat_id=6226815698
Targets
-
-
Target
file.exe
-
Size
147KB
-
MD5
27d11d6ddc6f80eed3b4fbd411b82014
-
SHA1
2c5f9eb7c3f8bf0b9cb9f05bc192ab37cb9384d8
-
SHA256
d56b2acb792a0e9e636c40190064525352293bbabd04d31a89978c0c167f50aa
-
SHA512
e4cda09a174769cfbb665c51410bbe9d40a0896148ad600bfd78195f90d793e96b0a2d149c709491af60381533c3c91b816f04875433849e22e1eda4d9484eff
-
SSDEEP
3072:lVHeqbQCpPCJc2L/BDLzEPzKcOP9aWvqXp087OsWVOQ28EwDx30kAmQiL:lVH3u7xsPzKhP9NSXJ7OLwV8EwVXQ
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-