Analysis
-
max time kernel
7s -
max time network
9s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
18-04-2021 23:01
Static task
static1
Behavioral task
behavioral1
Sample
6b37d35716224640ab1970852d0dc7d7.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
6b37d35716224640ab1970852d0dc7d7.exe
-
Size
357KB
-
MD5
6b37d35716224640ab1970852d0dc7d7
-
SHA1
8835646873e64ff3a6b3e4177b7ed75d8f840762
-
SHA256
d26a98d84423d1b79e2f01fe69e09c3fe65841ceb59c1c36b12b84aaafcb77e9
-
SHA512
afbdb041f9bfadd80050a2fc92cff7c99639b22acb290d97f0bf37d018123d26edf1cb2976bda72785f36da8024772318685ba8ecf95340fddc67ed6a48b0453
Malware Config
Signatures
-
Taurus Stealer Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1776-60-0x00000000002F0000-0x0000000000328000-memory.dmp family_taurus_stealer behavioral1/memory/1776-61-0x0000000000400000-0x0000000000486000-memory.dmp family_taurus_stealer -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.