General
-
Target
TelegramRAT.exe
-
Size
136KB
-
Sample
250408-zdtwja1ls9
-
MD5
d6c713ccdb3f239da0c223cdb12d82d6
-
SHA1
e7c63a8ab0f369f2a6b2a1efeaa6a413bb0d2f1a
-
SHA256
80f0a1615b3f308ddfee828e7c3af89fceaf2bef6b8c5e46d0cc3e1ad70fa5c0
-
SHA512
c015e16c3fa6078964a6bf5112850e4e78581e0f16e3bd0b3a7927848f3f27545048ff8a494b78bfd70ca8313db903bd725f47b7927bec29938d309c4ef7d386
-
SSDEEP
3072:v3r1ZCgpMHg/kB625V+64emllImcKbZnQcQWXPCrAZuQcEeZcA/KY/:vZhpFkB62wlLbdXI
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7582691185:AAFMBoknnYf6nr-rXlzotfzCNnqEPGSYrqc/sendMessage?chat_id=8029727797
Targets
-
-
Target
TelegramRAT.exe
-
Size
136KB
-
MD5
d6c713ccdb3f239da0c223cdb12d82d6
-
SHA1
e7c63a8ab0f369f2a6b2a1efeaa6a413bb0d2f1a
-
SHA256
80f0a1615b3f308ddfee828e7c3af89fceaf2bef6b8c5e46d0cc3e1ad70fa5c0
-
SHA512
c015e16c3fa6078964a6bf5112850e4e78581e0f16e3bd0b3a7927848f3f27545048ff8a494b78bfd70ca8313db903bd725f47b7927bec29938d309c4ef7d386
-
SSDEEP
3072:v3r1ZCgpMHg/kB625V+64emllImcKbZnQcQWXPCrAZuQcEeZcA/KY/:vZhpFkB62wlLbdXI
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Toxiceye family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Enumerates processes with tasklist
-