General

  • Target

    TelegramRAT.exe

  • Size

    136KB

  • Sample

    250408-zdtwja1ls9

  • MD5

    d6c713ccdb3f239da0c223cdb12d82d6

  • SHA1

    e7c63a8ab0f369f2a6b2a1efeaa6a413bb0d2f1a

  • SHA256

    80f0a1615b3f308ddfee828e7c3af89fceaf2bef6b8c5e46d0cc3e1ad70fa5c0

  • SHA512

    c015e16c3fa6078964a6bf5112850e4e78581e0f16e3bd0b3a7927848f3f27545048ff8a494b78bfd70ca8313db903bd725f47b7927bec29938d309c4ef7d386

  • SSDEEP

    3072:v3r1ZCgpMHg/kB625V+64emllImcKbZnQcQWXPCrAZuQcEeZcA/KY/:vZhpFkB62wlLbdXI

Malware Config

Extracted

Family

toxiceye

C2

https://api.telegram.org/bot7582691185:AAFMBoknnYf6nr-rXlzotfzCNnqEPGSYrqc/sendMessage?chat_id=8029727797

Targets

    • Target

      TelegramRAT.exe

    • Size

      136KB

    • MD5

      d6c713ccdb3f239da0c223cdb12d82d6

    • SHA1

      e7c63a8ab0f369f2a6b2a1efeaa6a413bb0d2f1a

    • SHA256

      80f0a1615b3f308ddfee828e7c3af89fceaf2bef6b8c5e46d0cc3e1ad70fa5c0

    • SHA512

      c015e16c3fa6078964a6bf5112850e4e78581e0f16e3bd0b3a7927848f3f27545048ff8a494b78bfd70ca8313db903bd725f47b7927bec29938d309c4ef7d386

    • SSDEEP

      3072:v3r1ZCgpMHg/kB625V+64emllImcKbZnQcQWXPCrAZuQcEeZcA/KY/:vZhpFkB62wlLbdXI

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • ToxicEye

      ToxicEye is a trojan written in C#.

    • Toxiceye family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v16

Tasks