Analysis
-
max time kernel
10s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
18-04-2021 12:40
Static task
static1
Behavioral task
behavioral1
Sample
777e7861b422ef1f95ab21140b165507.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
777e7861b422ef1f95ab21140b165507.exe
-
Size
344KB
-
MD5
777e7861b422ef1f95ab21140b165507
-
SHA1
3d8352d71ea8b7d815f49793534f2c0c4976f324
-
SHA256
2713778531071a2f5e9d1166b2e55ed95afeaaa7b839bd504c7453448f583cee
-
SHA512
a80e5c4a8797b730416d2e651891aa1e5f6b5f3c4b0561eacdd3da178ece2d5d2ddd58b2a41c918a82fb65b7bef7a9ddc3c090c572e2466ca153552a89a3fa5b
Malware Config
Signatures
-
Taurus Stealer Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1016-114-0x00000000001C0000-0x00000000001F8000-memory.dmp family_taurus_stealer behavioral2/memory/1016-115-0x0000000000400000-0x0000000000483000-memory.dmp family_taurus_stealer -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.