General
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
Family
toxiceye
C2
https://api.telegram.org/bot5687152406:AAFin_LYFhJGLydMgYheeUDec-2orew51aM/sendMessage?chat_id=2024893777
Extracted
Family
asyncrat
Version
1.0.7
Botnet
def
C2
37.18.62.18:8060
Mutex
era2312swe12-1213rsgdkms23
Attributes
-
delay
1
-
install
true
-
install_file
CCXProcess.exe
-
install_folder
%Temp%
aes.plain
Targets
-
-
Target
https://github.com/errias/XWorm-Rat-Remote-Administration-Tool-
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-