General

  • Target

    fda422a54b108ec592b499e0dc59e6c6.exe

  • Size

    704KB

  • Sample

    210330-49prt8wz2n

  • MD5

    fda422a54b108ec592b499e0dc59e6c6

  • SHA1

    8ee655935d7620a6d2f18f26d0532f9dfa8b56e8

  • SHA256

    0e55e17532909ad5ad34eb4e35d791b27c6951dd15a8baba34c29ae572c884d0

  • SHA512

    11a8e56836af1b1b86dbea68fc570535d2f74266fecda6fa9e6f90431d9596740632a35fa0ca86d8b9f58706425f3ecda2dc572f3c47bf7e2323c02f43ead52e

Malware Config

Targets

    • Target

      fda422a54b108ec592b499e0dc59e6c6.exe

    • Size

      704KB

    • MD5

      fda422a54b108ec592b499e0dc59e6c6

    • SHA1

      8ee655935d7620a6d2f18f26d0532f9dfa8b56e8

    • SHA256

      0e55e17532909ad5ad34eb4e35d791b27c6951dd15a8baba34c29ae572c884d0

    • SHA512

      11a8e56836af1b1b86dbea68fc570535d2f74266fecda6fa9e6f90431d9596740632a35fa0ca86d8b9f58706425f3ecda2dc572f3c47bf7e2323c02f43ead52e

    • Taurus Stealer

      Taurus is an infostealer first seen in June 2020.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks