Overview
overview
10Static
static
10AudioSwitc...io.dll
windows10-2004-x64
1AudioSwitc...io.dll
windows11-21h2-x64
1AudioSwitc...pi.dll
windows10-2004-x64
1AudioSwitc...pi.dll
windows11-21h2-x64
1Sodium.dll
windows10-2004-x64
1Sodium.dll
windows11-21h2-x64
1TelegramRAT.exe
windows10-2004-x64
10TelegramRAT.exe
windows11-21h2-x64
10TelegramRAT.exe.xml
windows10-2004-x64
1TelegramRAT.exe.xml
windows11-21h2-x64
1TelegramRAT.pdb
windows10-2004-x64
3TelegramRAT.pdb
windows11-21h2-x64
3General
-
Target
TelegramRAT.zip
-
Size
180KB
-
Sample
240427-lf2r9sff54
-
MD5
cc2bc21c47e62001401a43dd817fb22c
-
SHA1
f072bc2337121f10ff7ecd08cea78bec33be849d
-
SHA256
c5ee6af8e3d3bdf216ce505c98458fb68f13360ad6c0cf50487b6bd3f33c52f8
-
SHA512
68e39b9862865bd181c78f111f7883e1e75e589b23dced21d18f1d9bf00f41464764fe1c0ce4bb9b44186a0ec5a94ae695bad793169ddd789b59ef92f893f96e
-
SSDEEP
3072:MO6+JfRgOj0IzgDTQv7oAixWbun91oilnmIFwI0WRsV1TXXPx7Ekp3:M9+JZ7jxzgvQDovXn964mIdevx7v
Behavioral task
behavioral1
Sample
AudioSwitcher.AudioApi.CoreAudio.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral2
Sample
AudioSwitcher.AudioApi.CoreAudio.dll
Resource
win11-20240419-en
Behavioral task
behavioral3
Sample
AudioSwitcher.AudioApi.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
AudioSwitcher.AudioApi.dll
Resource
win11-20240419-en
Behavioral task
behavioral5
Sample
Sodium.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
Sodium.dll
Resource
win11-20240419-en
Behavioral task
behavioral7
Sample
TelegramRAT.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
TelegramRAT.exe
Resource
win11-20240419-en
Behavioral task
behavioral9
Sample
TelegramRAT.exe.xml
Resource
win10v2004-20240419-en
Behavioral task
behavioral10
Sample
TelegramRAT.exe.xml
Resource
win11-20240426-en
Behavioral task
behavioral11
Sample
TelegramRAT.pdb
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
TelegramRAT.pdb
Resource
win11-20240419-en
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7005624592:AAFT1GroRFjOnavaa8nJipFR-iCuYT3f2xQ/sendMessage?chat_id=6235796510
Targets
-
-
Target
AudioSwitcher.AudioApi.CoreAudio.dll
-
Size
76KB
-
MD5
1a3571119038a479c298097087635803
-
SHA1
95daf8034c518a52639fb845aad28bec57fd5cd3
-
SHA256
f496f74f48f3dbb499474ef0a06894079087871342b3e3bc254c5903e4aebf91
-
SHA512
d534bc4117a3ed5ce0a14f6658679b75a05453a41522d6307af4e0ab3bbee7049f70671a50db7dc3804fe5f6ccb6a4496f1a316222eab076deb6d39ac93c4c43
-
SSDEEP
1536:QlhKei7+LjzyJmJtJhendwV61ncQmlp/bV:Qo7+3zcndwIncQM/bV
Score1/10 -
-
-
Target
AudioSwitcher.AudioApi.dll
-
Size
40KB
-
MD5
3f88b41942ec020c9b66f464b3d1c899
-
SHA1
a846f0855d5250dc4dda9d3c37f6862e93ebc802
-
SHA256
26ff364fca496ee1093de596645c86731c156d81d026b5d020de46b0df053513
-
SHA512
dffe0b98033258ba3e58c43bf4e17e280ffb44c0d3c7a5b1c58761acc0ec2e4c30a035bae6df220c5ec07c641d494ccb135bc7b75977021dc2059f2e4e735af0
-
SSDEEP
384:iFo07NXH3jI8tRM1sGyfPodV/FU92983yggIwFTIVk1yUsUg43prF7RfrEEJvHQb:iG07NDI2ql8PQVtd83p40VoFtsT5h
Score1/10 -
-
-
Target
Sodium.dll
-
Size
59KB
-
MD5
fa95d735f88e819edc0cef02d3ee4781
-
SHA1
9e3c03ee4b0efeedf59edaca15ea304d2ec4cec7
-
SHA256
bf5b02ac516e9b62086649f43a29287c7872bbdb87512e9d5ec1be681c77a94a
-
SHA512
554cf8906c7e4bc15653685e70e96995bfdf0803fb30ca196d8bc34f9bfb888a7a1de64e8441415155889893ac7769bb643aa87913f5176c80588b1e3a38348b
-
SSDEEP
1536:CjCH26g5fMVJXJO466QZmtQLrG3HbK7HIN8xmZ/zuXohMU6i3HFkdEpy:CmH26gr466HtQMbK7HIN8xmZ/zuXohML
Score1/10 -
-
-
Target
TelegramRAT.exe
-
Size
111KB
-
MD5
8834c1eaf28b3b076df2a0aac5d1148e
-
SHA1
640e70c94c0e01492c4c45cf2b23b65914a94cc5
-
SHA256
49f704606ec839fa6867a5f5f67090299b69b02dab7d352e161c8a754165de8a
-
SHA512
59c6d085818d43607ee2aef904899690a116a34f6e50978c35017d1a546964bcdfc435b7fb09bab998d4d0eacc8b614a58a55c029311d7c33473a501f4f3f561
-
SSDEEP
1536:p+bvqJIP4M91qQIwzUrxxxdKy2nBfUbhDqI6CsQWVzCrAZuDZ6Dd:sbvqJe4MUlxxDrbxqHBQWVzCrAZuDQd
-
Renames multiple (254) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
-
-
Target
TelegramRAT.exe.config
-
Size
161B
-
MD5
c16b0746faa39818049fe38709a82c62
-
SHA1
3fa322fe6ed724b1bc4fd52795428a36b7b8c131
-
SHA256
d61bde901e7189cc97d45a1d4c4aa39d4c4de2b68419773ec774338506d659ad
-
SHA512
cbcba899a067f8dc32cfcbd1779a6982d25955de91e1e02cee8eaf684a01b0dee3642c2a954903720ff6086de5a082147209868c03665c89f814c6219be2df7c
Score1/10 -
-
-
Target
TelegramRAT.pdb
-
Size
239KB
-
MD5
f7a782a1898a88c9e492087bae1d7735
-
SHA1
647cec65b984f258dcd8cf75eb13fe100e0f8d66
-
SHA256
391846de21171c6e41bcc667fc53c5028554226b673e402a486cf4b41b9a25d9
-
SHA512
701e57d1c53ed368d95d4d5aa7379c32f81322bdcf6320a29d6ca690ed3780738aa5dd86797fbbe4f693a3804b89c4124e849e9f146b226aac7df21ea54ee794
-
SSDEEP
3072:0Uy6brhZ3mXPTVv5p7lanhtOtT99/MxYq8rT5r+ZrNpCZEC4wh1J1j+dyIeyagpH:u99UxYqsTFONkZEC4cs4
Score3/10 -