General

  • Target

    test.zip

  • Size

    125KB

  • Sample

    240622-swdtpsxaqj

  • MD5

    25e198620340a4078de86c1ac3cd84b2

  • SHA1

    783bdb61289143c55706aab4c3584f4e9cae5bec

  • SHA256

    326c8c9973b12608df1ea91dddd315f287a2a82789ce6523d01edc5dbb5380f8

  • SHA512

    721e62963b3b527fca346ba0a6452bdf5bb89c6e6fd319838db9d242468efedff45b9273a086108f3937d69d9388c8b61239d653c0ab4ca52eed5ce0a9c18975

  • SSDEEP

    3072:dO6+JfRgOj0IQgDTQi7ozMBNXp1KEU0CwSfat0zgI+:d9+JZ7jxQgvQ8ozMBl60rSfa6j+

Score
10/10

Malware Config

Extracted

Family

toxiceye

C2

https://api.telegram.org/bot7461409177:AAHMv-EtRWu0uEGj_eiICpHa8RT1JBvjytE/sendMessage?chat_id=7179640777

Targets

    • Target

      AudioSwitcher.AudioApi.CoreAudio.dll

    • Size

      76KB

    • MD5

      1a3571119038a479c298097087635803

    • SHA1

      95daf8034c518a52639fb845aad28bec57fd5cd3

    • SHA256

      f496f74f48f3dbb499474ef0a06894079087871342b3e3bc254c5903e4aebf91

    • SHA512

      d534bc4117a3ed5ce0a14f6658679b75a05453a41522d6307af4e0ab3bbee7049f70671a50db7dc3804fe5f6ccb6a4496f1a316222eab076deb6d39ac93c4c43

    • SSDEEP

      1536:QlhKei7+LjzyJmJtJhendwV61ncQmlp/bV:Qo7+3zcndwIncQM/bV

    Score
    1/10
    • Target

      AudioSwitcher.AudioApi.dll

    • Size

      40KB

    • MD5

      3f88b41942ec020c9b66f464b3d1c899

    • SHA1

      a846f0855d5250dc4dda9d3c37f6862e93ebc802

    • SHA256

      26ff364fca496ee1093de596645c86731c156d81d026b5d020de46b0df053513

    • SHA512

      dffe0b98033258ba3e58c43bf4e17e280ffb44c0d3c7a5b1c58761acc0ec2e4c30a035bae6df220c5ec07c641d494ccb135bc7b75977021dc2059f2e4e735af0

    • SSDEEP

      384:iFo07NXH3jI8tRM1sGyfPodV/FU92983yggIwFTIVk1yUsUg43prF7RfrEEJvHQb:iG07NDI2ql8PQVtd83p40VoFtsT5h

    Score
    1/10
    • Target

      Sodium.dll

    • Size

      59KB

    • MD5

      fa95d735f88e819edc0cef02d3ee4781

    • SHA1

      9e3c03ee4b0efeedf59edaca15ea304d2ec4cec7

    • SHA256

      bf5b02ac516e9b62086649f43a29287c7872bbdb87512e9d5ec1be681c77a94a

    • SHA512

      554cf8906c7e4bc15653685e70e96995bfdf0803fb30ca196d8bc34f9bfb888a7a1de64e8441415155889893ac7769bb643aa87913f5176c80588b1e3a38348b

    • SSDEEP

      1536:CjCH26g5fMVJXJO466QZmtQLrG3HbK7HIN8xmZ/zuXohMU6i3HFkdEpy:CmH26gr466HtQMbK7HIN8xmZ/zuXohML

    Score
    1/10
    • Target

      TelegramRAT.exe

    • Size

      134KB

    • MD5

      9e42a10f47504187c94f322a2310e636

    • SHA1

      4c3a8dab9828526f0549c5241427ac469fb0a5d9

    • SHA256

      bc41546cae12831ff597fcaaeee1786b8814def1701a77cd67305252af49319e

    • SHA512

      812b6b7ccb28d783a14e1b6c3092d81f518193e6762ca6898a2fa999747c6ca03313d9e381c268520574cc29ebbda00ce4a2a66565bd96b2aea79aecfd8f8fd1

    • SSDEEP

      3072:03r30HMtQ05ysqUB0ErIqzwjAFXbbv104QWN5CrAZuHD3:04MtQ05ysjxJbbNh

    Score
    10/10
    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • ToxicEye

      ToxicEye is a trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks