General
-
Target
TelegramRAT.exe
-
Size
146KB
-
Sample
250408-zf3lfs1lx7
-
MD5
406a5cb1b15ae669a9f28fdd7301e2f0
-
SHA1
13f6bc53753e5be52e53ffc6686b5d2b930a46ac
-
SHA256
f4897365644f81143f94707c6e0153e3026f83c40c5dd218cf89e110d7d5a724
-
SHA512
f79272832508808cb145309c378883296058365064fb168fc8856d3634364019aa4790bdb93ed660a18f9dc83337b1f76873a4e5e2c196f3974e753c158fb665
-
SSDEEP
3072:flp6GWVke8WEhv9cQfYEv1c+68cGPKS2ZbZLQAQWXPCrAZuQcEeZcA/1P:flppWV2Ysq+jcGySmbF7
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7582691185:AAFMBoknnYf6nr-rXlzotfzCNnqEPGSYrqc/sendMessage?chat_id=8029727797
Targets
-
-
Target
TelegramRAT.exe
-
Size
146KB
-
MD5
406a5cb1b15ae669a9f28fdd7301e2f0
-
SHA1
13f6bc53753e5be52e53ffc6686b5d2b930a46ac
-
SHA256
f4897365644f81143f94707c6e0153e3026f83c40c5dd218cf89e110d7d5a724
-
SHA512
f79272832508808cb145309c378883296058365064fb168fc8856d3634364019aa4790bdb93ed660a18f9dc83337b1f76873a4e5e2c196f3974e753c158fb665
-
SSDEEP
3072:flp6GWVke8WEhv9cQfYEv1c+68cGPKS2ZbZLQAQWXPCrAZuQcEeZcA/1P:flppWV2Ysq+jcGySmbF7
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Toxiceye family
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Enumerates processes with tasklist
-