General
-
Target
start.bat
-
Size
359B
-
Sample
250408-1xh4tasmv5
-
MD5
567faa0407f102c40f1796b392530852
-
SHA1
0adbdf7d448caae6e96e067d1551b7462d26c4fd
-
SHA256
ea346b60666802c1985522daf4187f41aef151475086125fdad8c0930e0f78d3
-
SHA512
0b3ef1798ef70ae67c9a65e1fce3dbb237224b6da6871c0777f3fc4438fbc5725be421c97220674d7a202a99736a206f4658119d8bcc7516699d022648082022
Static task
static1
Malware Config
Extracted
https://github.com/Igor65afk/cxvd-vvcxxcvcxv/raw/refs/heads/main/TelegramRAT.exe
Extracted
toxiceye
https://api.telegram.org/bot7582691185:AAHyDd26FPsOpJGflKOytG7VEH8s8wridm0/sendMessage?chat_id=8029727797
Targets
-
-
Target
start.bat
-
Size
359B
-
MD5
567faa0407f102c40f1796b392530852
-
SHA1
0adbdf7d448caae6e96e067d1551b7462d26c4fd
-
SHA256
ea346b60666802c1985522daf4187f41aef151475086125fdad8c0930e0f78d3
-
SHA512
0b3ef1798ef70ae67c9a65e1fce3dbb237224b6da6871c0777f3fc4438fbc5725be421c97220674d7a202a99736a206f4658119d8bcc7516699d022648082022
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Toxiceye family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1