General
-
Target
0F1D580624CC7159B639BB65686EFBBA.exe
-
Size
932KB
-
Sample
210730-49rxy2eqqe
-
MD5
0f1d580624cc7159b639bb65686efbba
-
SHA1
53415dcbf70f15094af36a3694579b8027019310
-
SHA256
0e362e064fca6127dff2f0b52d55343494ed661e54aafad7ee923545974ec2e1
-
SHA512
01f349e40fb7e8ca9ef874cfdb48c776f17760618dbbc37d756e4e9dbb446d55e0fbad5c8848fa5845341a916b3f4ad0f30be9197505a80ea35b7afdc7de98f7
Static task
static1
Behavioral task
behavioral1
Sample
0F1D580624CC7159B639BB65686EFBBA.exe
Resource
win7v20210408
Malware Config
Targets
-
-
Target
0F1D580624CC7159B639BB65686EFBBA.exe
-
Size
932KB
-
MD5
0f1d580624cc7159b639bb65686efbba
-
SHA1
53415dcbf70f15094af36a3694579b8027019310
-
SHA256
0e362e064fca6127dff2f0b52d55343494ed661e54aafad7ee923545974ec2e1
-
SHA512
01f349e40fb7e8ca9ef874cfdb48c776f17760618dbbc37d756e4e9dbb446d55e0fbad5c8848fa5845341a916b3f4ad0f30be9197505a80ea35b7afdc7de98f7
-
Taurus Stealer Payload
-
Deletes itself
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-