General

  • Target

    c42634f75c9b327a17684b55e162ec9a.exe

  • Size

    713KB

  • Sample

    210327-51ja1e1tfs

  • MD5

    c42634f75c9b327a17684b55e162ec9a

  • SHA1

    c21f18b46532fa32d45b671b7e804404cff23976

  • SHA256

    2ae59af40109d186eb8999211e8ad933d2fffec609a2bdbd87a8aa4e9654a111

  • SHA512

    7590c1a35add4ad87b3e73a2140efecdbf405c6fb0888d23b9e5288786c037dc458ac53c1ce9b91146807393ea64c2084d56b38e797c9b19fd63b772f45d4f08

Malware Config

Targets

    • Target

      c42634f75c9b327a17684b55e162ec9a.exe

    • Size

      713KB

    • MD5

      c42634f75c9b327a17684b55e162ec9a

    • SHA1

      c21f18b46532fa32d45b671b7e804404cff23976

    • SHA256

      2ae59af40109d186eb8999211e8ad933d2fffec609a2bdbd87a8aa4e9654a111

    • SHA512

      7590c1a35add4ad87b3e73a2140efecdbf405c6fb0888d23b9e5288786c037dc458ac53c1ce9b91146807393ea64c2084d56b38e797c9b19fd63b772f45d4f08

    • Taurus Stealer

      Taurus is an infostealer first seen in June 2020.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks