Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
05-03-2022 18:40
Static task
static1
Behavioral task
behavioral1
Sample
502572d06c7db1bcaf2b9421ca873055182fb36a51ed5c9b725c6d3e12a66837.exe
Resource
win7-20220223-en
0 signatures
0 seconds
General
-
Target
502572d06c7db1bcaf2b9421ca873055182fb36a51ed5c9b725c6d3e12a66837.exe
-
Size
457KB
-
MD5
258761933114aff3793796ea1a08ff72
-
SHA1
7b46a0ef06ebece1b2da53f2a68013bfc9e9e39a
-
SHA256
502572d06c7db1bcaf2b9421ca873055182fb36a51ed5c9b725c6d3e12a66837
-
SHA512
08d7507a570568fdfb1fa3f5cef14048a7b195753b7c76928f3150c3ea74e0c0596da655e59f7bfb2cb169efbc16166bee403b20b8b2ce934c7d7a4a923d2a5d
Malware Config
Signatures
-
Taurus Stealer Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1052-131-0x0000000000400000-0x0000000000474000-memory.dmp family_taurus_stealer -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.