Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
18-04-2021 22:10
Static task
static1
Behavioral task
behavioral1
Sample
60580df56a0acf9033a460559bd5330b.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
60580df56a0acf9033a460559bd5330b.exe
-
Size
357KB
-
MD5
60580df56a0acf9033a460559bd5330b
-
SHA1
5414b1e9da7a8009afaf982b94c5c044a508646d
-
SHA256
77d58783013a7d18f57937c53e5ac21840df059a8119b47c5c68dbc3a4809013
-
SHA512
11441237d7536ed0ceaa4ff4457410973261b12d2bcdee70228918b01d97c960f2507a6dcf3e17ae3ab31a0cd3aa421925063818d7a3195ecf9859863ff25600
Malware Config
Signatures
-
Taurus Stealer Payload 2 IoCs
resource yara_rule behavioral1/memory/1820-61-0x0000000000220000-0x0000000000258000-memory.dmp family_taurus_stealer behavioral1/memory/1820-62-0x0000000000400000-0x0000000000486000-memory.dmp family_taurus_stealer -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.