General
-
Target
75f0b10428471619c2cb34bf7abdef10bb192f238ff09e67a8433ddc6c9e6b76
-
Size
2.7MB
-
Sample
250127-zkp6xsvrcp
-
MD5
e8750312901386f028ec2e7ba93acdd1
-
SHA1
8dabf23f1b0732eeae8f371005e392afa3787829
-
SHA256
75f0b10428471619c2cb34bf7abdef10bb192f238ff09e67a8433ddc6c9e6b76
-
SHA512
6664206165b2605817492a1dad5b47c9996166c3a9873f9a086d64c3ad87213e89567277c9b7760537efc2e67a5c2b5c4412169eb69f5a31d9f675b7088e429c
-
SSDEEP
49152:KOmkuWsQFMi4mKH3NmB6JqsG/a5lFHSqLbWKkHs1zfgRAZzgCNP+u+vR9hoU7Uvj:TmbW/MVmKHEB6c0lFHTbWLmbgRWUCh+M
Static task
static1
Behavioral task
behavioral1
Sample
75f0b10428471619c2cb34bf7abdef10bb192f238ff09e67a8433ddc6c9e6b76.exe
Resource
win7-20240903-en
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7203802626:AAE_9_dltxewBu7ddFljX_qb4SON6Zl9EzQ/sendMessage?chat_id=688494782
Targets
-
-
Target
75f0b10428471619c2cb34bf7abdef10bb192f238ff09e67a8433ddc6c9e6b76
-
Size
2.7MB
-
MD5
e8750312901386f028ec2e7ba93acdd1
-
SHA1
8dabf23f1b0732eeae8f371005e392afa3787829
-
SHA256
75f0b10428471619c2cb34bf7abdef10bb192f238ff09e67a8433ddc6c9e6b76
-
SHA512
6664206165b2605817492a1dad5b47c9996166c3a9873f9a086d64c3ad87213e89567277c9b7760537efc2e67a5c2b5c4412169eb69f5a31d9f675b7088e429c
-
SSDEEP
49152:KOmkuWsQFMi4mKH3NmB6JqsG/a5lFHSqLbWKkHs1zfgRAZzgCNP+u+vR9hoU7Uvj:TmbW/MVmKHEB6c0lFHTbWLmbgRWUCh+M
-
Toxiceye family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1