Analysis
-
max time kernel
9s -
max time network
12s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
18-04-2021 21:35
Static task
static1
Behavioral task
behavioral1
Sample
211b48c0312c2395ab4f4d248016f6d4.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
211b48c0312c2395ab4f4d248016f6d4.exe
-
Size
357KB
-
MD5
211b48c0312c2395ab4f4d248016f6d4
-
SHA1
5380d7078eaa9a6ebbc592f2f0f9525bbae6a9e3
-
SHA256
00a4647a53a0366092f6ee9571244ca44546e8b92998e654c4168ff1cccb439b
-
SHA512
64ab86886140d92ed7c4524dc0eb3f39d2c65e75789ff555eb01675fe3895caedd8159002c1d16570775b18ef5a885173c25c3d4f24df0c049dcb4adefc28467
Malware Config
Signatures
-
Taurus Stealer Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1096-61-0x0000000000400000-0x0000000000486000-memory.dmp family_taurus_stealer behavioral1/memory/1096-60-0x0000000000220000-0x0000000000258000-memory.dmp family_taurus_stealer -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.