General

  • Target

    start.bat

  • Size

    359B

  • Sample

    250408-1xh4tasmv5

  • MD5

    567faa0407f102c40f1796b392530852

  • SHA1

    0adbdf7d448caae6e96e067d1551b7462d26c4fd

  • SHA256

    ea346b60666802c1985522daf4187f41aef151475086125fdad8c0930e0f78d3

  • SHA512

    0b3ef1798ef70ae67c9a65e1fce3dbb237224b6da6871c0777f3fc4438fbc5725be421c97220674d7a202a99736a206f4658119d8bcc7516699d022648082022

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://github.com/Igor65afk/cxvd-vvcxxcvcxv/raw/refs/heads/main/TelegramRAT.exe

Extracted

Family

toxiceye

C2

https://api.telegram.org/bot7582691185:AAHyDd26FPsOpJGflKOytG7VEH8s8wridm0/sendMessage?chat_id=8029727797

Targets

    • Target

      start.bat

    • Size

      359B

    • MD5

      567faa0407f102c40f1796b392530852

    • SHA1

      0adbdf7d448caae6e96e067d1551b7462d26c4fd

    • SHA256

      ea346b60666802c1985522daf4187f41aef151475086125fdad8c0930e0f78d3

    • SHA512

      0b3ef1798ef70ae67c9a65e1fce3dbb237224b6da6871c0777f3fc4438fbc5725be421c97220674d7a202a99736a206f4658119d8bcc7516699d022648082022

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • ToxicEye

      ToxicEye is a trojan written in C#.

    • Toxiceye family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v16

Tasks