C:\Users\rusla\OneDrive\Desktop\ToxicEye-master\TelegramRAT\TelegramRAT\obj\Release\TelegramRAT.pdb
General
-
Target
Nursultan Crack.exe
-
Size
111KB
-
MD5
0dd740e6b9ef233d114a6a9760deef8d
-
SHA1
2173e0f562091e6e8e013a20be9a64a883cab48f
-
SHA256
5bd364033480d135fce29b38ef89ff65a221ef39ab8ca5eb2cf2f239805cbc3c
-
SHA512
abfa94848d0808b0da24e71bf4117a6c7dcde8bffc1054d21def3b052442f2589d9e73ef9ba6c321da83d4aef9e9970d0066456985f599c314a11de9f6d28bd8
-
SSDEEP
3072:cbk3P7tiPQHZxj8bxqHqQW/zCrAZuyxv:9P7YPkgbUY
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot6998171236:AAHZzzN-_3RkZvr6lSYqrgfeGycmwh5j24U/sendMessage?chat_id=5179630861
Signatures
-
Toxiceye family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Nursultan Crack.exe
Files
-
Nursultan Crack.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ