C:\Users\PC\Downloads\ToxicEye (RAT + STEALER + CLIPPER)\ToxicEye\TelegramRAT\obj\Release\Chrome Update.pdb
General
-
Target
Chrome Update.exe
-
Size
111KB
-
MD5
05112dda1331e95ffb3f49199f30e3c4
-
SHA1
5719297583edf0d07cadf0f6e27a6476bde5249b
-
SHA256
16424b4f2ad3135749aca508caa528264bd42a7fcdcfe44dc538198dd29aa75e
-
SHA512
a39241b8c2c4176f550d0151c403f8b350eba31078bc697af015dd93a9cc94b12dcbbde74e357a8936bc93fea59a020c18081bfaef3419acbb3ef380c9b64ef0
-
SSDEEP
3072:bbKsnwo0g30ro8NbZqH4QWqzCrAZuuBUp:ysnwo4rvbM1
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7742822790:AAHkizf3bilCkIqp8NNVcbWObKSVKo8Xifo/sendMessage?chat_id=7053620590
Signatures
-
Toxiceye family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Chrome Update.exe
Files
-
Chrome Update.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ