General
-
Target
211b48c0312c2395ab4f4d248016f6d4.exe
-
Size
357KB
-
Sample
210418-wmtfvvq5sx
-
MD5
211b48c0312c2395ab4f4d248016f6d4
-
SHA1
5380d7078eaa9a6ebbc592f2f0f9525bbae6a9e3
-
SHA256
00a4647a53a0366092f6ee9571244ca44546e8b92998e654c4168ff1cccb439b
-
SHA512
64ab86886140d92ed7c4524dc0eb3f39d2c65e75789ff555eb01675fe3895caedd8159002c1d16570775b18ef5a885173c25c3d4f24df0c049dcb4adefc28467
Static task
static1
Behavioral task
behavioral1
Sample
211b48c0312c2395ab4f4d248016f6d4.exe
Resource
win7v20210408
Malware Config
Targets
-
-
Target
211b48c0312c2395ab4f4d248016f6d4.exe
-
Size
357KB
-
MD5
211b48c0312c2395ab4f4d248016f6d4
-
SHA1
5380d7078eaa9a6ebbc592f2f0f9525bbae6a9e3
-
SHA256
00a4647a53a0366092f6ee9571244ca44546e8b92998e654c4168ff1cccb439b
-
SHA512
64ab86886140d92ed7c4524dc0eb3f39d2c65e75789ff555eb01675fe3895caedd8159002c1d16570775b18ef5a885173c25c3d4f24df0c049dcb4adefc28467
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Taurus Stealer Payload
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-