Analysis
-
max time kernel
107s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2025, 20:44
General
-
Target
P26NP_TelegramRAT.exe
-
Size
146KB
-
MD5
406a5cb1b15ae669a9f28fdd7301e2f0
-
SHA1
13f6bc53753e5be52e53ffc6686b5d2b930a46ac
-
SHA256
f4897365644f81143f94707c6e0153e3026f83c40c5dd218cf89e110d7d5a724
-
SHA512
f79272832508808cb145309c378883296058365064fb168fc8856d3634364019aa4790bdb93ed660a18f9dc83337b1f76873a4e5e2c196f3974e753c158fb665
-
SSDEEP
3072:flp6GWVke8WEhv9cQfYEv1c+68cGPKS2ZbZLQAQWXPCrAZuQcEeZcA/1P:flppWV2Ysq+jcGySmbF7
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7582691185:AAFMBoknnYf6nr-rXlzotfzCNnqEPGSYrqc/sendMessage?chat_id=8029727797
Signatures
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/3636-1-0x0000023E3EF90000-0x0000023E3EFBA000-memory.dmp disable_win_def behavioral1/files/0x000900000002413f-9.dat disable_win_def -
Toxiceye family
-
Downloads MZ/PE file 2 IoCs
flow pid Process 29 5020 total.exe 28 5020 total.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation P26NP_TelegramRAT.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation total.exe -
Executes dropped EXE 1 IoCs
pid Process 5020 total.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 27 raw.githubusercontent.com 28 raw.githubusercontent.com 29 raw.githubusercontent.com -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 5832 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 4996 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4828 schtasks.exe 5584 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 5020 total.exe 5020 total.exe 5020 total.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3636 P26NP_TelegramRAT.exe Token: SeDebugPrivilege 5832 tasklist.exe Token: SeDebugPrivilege 5020 total.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5020 total.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3636 wrote to memory of 4828 3636 P26NP_TelegramRAT.exe 93 PID 3636 wrote to memory of 4828 3636 P26NP_TelegramRAT.exe 93 PID 3636 wrote to memory of 3660 3636 P26NP_TelegramRAT.exe 96 PID 3636 wrote to memory of 3660 3636 P26NP_TelegramRAT.exe 96 PID 3660 wrote to memory of 5832 3660 cmd.exe 98 PID 3660 wrote to memory of 5832 3660 cmd.exe 98 PID 3660 wrote to memory of 5516 3660 cmd.exe 99 PID 3660 wrote to memory of 5516 3660 cmd.exe 99 PID 3660 wrote to memory of 4996 3660 cmd.exe 100 PID 3660 wrote to memory of 4996 3660 cmd.exe 100 PID 3660 wrote to memory of 5020 3660 cmd.exe 101 PID 3660 wrote to memory of 5020 3660 cmd.exe 101 PID 5020 wrote to memory of 5584 5020 total.exe 103 PID 5020 wrote to memory of 5584 5020 total.exe 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\P26NP_TelegramRAT.exe"C:\Users\Admin\AppData\Local\Temp\P26NP_TelegramRAT.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "discord" /tr "C:\Users\virustotal\total.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4828
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp705D.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp705D.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 3636"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5832
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:5516
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:4996
-
-
C:\Users\virustotal\total.exe"total.exe"3⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "discord" /tr "C:\Users\virustotal\total.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:5584
-
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198B
MD54e3eb07f42827ebf42169bd1cf7ec437
SHA199459ddd009efe96e9cc3bb4f6b27556865d87d6
SHA256951a8ab498d40556f6ba68533247c5babc7488b5640108621e5d26da40aae720
SHA51250741aa5b29f91e1cc72ea51d7bb29e06730b84924eef53e3702b97dbe0375d9146c8881c314432bb6bc7c49174cd13b3bf05178b9a8fa79dbb2aff1335a6a87
-
Filesize
146KB
MD5406a5cb1b15ae669a9f28fdd7301e2f0
SHA113f6bc53753e5be52e53ffc6686b5d2b930a46ac
SHA256f4897365644f81143f94707c6e0153e3026f83c40c5dd218cf89e110d7d5a724
SHA512f79272832508808cb145309c378883296058365064fb168fc8856d3634364019aa4790bdb93ed660a18f9dc83337b1f76873a4e5e2c196f3974e753c158fb665