C:\Users\doene\Desktop\TelegramRAT\TelegramRAT\obj\Debug\TelegramRAT.pdb
General
-
Target
TelegramRAT.exe
-
Size
119KB
-
MD5
2a158aa6d32bd8151cdfd7b22e10dec7
-
SHA1
02093169233f0ba62b969cecfca221545ec997e9
-
SHA256
1367b63812aeb5681a035b816f583936d120a87f7d302082ebc1b49e5bca2a43
-
SHA512
32fc1a0a28bc8f55ab91b8915dbffb9c68caf031c7a07ba0ce084c66a7579530dfeb912fd12b0d539fc1ba4ac8b9478969329d20b58adbd8e20f9741c6cf18ee
-
SSDEEP
3072:vC7CSYq7OMmgmm+S/bxqHyQW0zCrAZuEQP:ozmnq/bg9
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot6846719011:AAG0Xm1OwIK5zd_7LBNmOoHmuZ6PH9mc7JY/sendMessage?chat_id=6059920057
Signatures
-
Toxiceye family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource TelegramRAT.exe
Files
-
TelegramRAT.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ