Analysis Overview
SHA256
502572d06c7db1bcaf2b9421ca873055182fb36a51ed5c9b725c6d3e12a66837
Threat Level: Known bad
The file 502572d06c7db1bcaf2b9421ca873055182fb36a51ed5c9b725c6d3e12a66837 was found to be: Known bad.
Malicious Activity Summary
Taurus Stealer
Taurus Stealer Payload
Reads user/profile data of web browsers
Checks installed software on the system
Accesses 2FA software files, possible credential harvesting
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-03-05 18:40
Signatures
Analysis: behavioral2
Detonation Overview
Submitted
2022-03-05 18:40
Reported
2022-03-05 18:43
Platform
win10v2004-en-20220112
Max time kernel
146s
Max time network
152s
Command Line
Signatures
Taurus Stealer
Taurus Stealer Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Reads user/profile data of web browsers
Accesses 2FA software files, possible credential harvesting
Checks installed software on the system
Processes
C:\Users\Admin\AppData\Local\Temp\502572d06c7db1bcaf2b9421ca873055182fb36a51ed5c9b725c6d3e12a66837.exe
"C:\Users\Admin\AppData\Local\Temp\502572d06c7db1bcaf2b9421ca873055182fb36a51ed5c9b725c6d3e12a66837.exe"
Network
| Country | Destination | Domain | Proto |
| NL | 45.91.200.120:80 | tcp | |
| US | 8.8.8.8:53 | geo.prod.do.dsp.mp.microsoft.com | udp |
| US | 52.143.84.45:443 | geo.prod.do.dsp.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | kv801.prod.do.dsp.mp.microsoft.com | udp |
| NL | 184.29.205.60:443 | kv801.prod.do.dsp.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | cp801.prod.do.dsp.mp.microsoft.com | udp |
| NL | 184.29.205.60:443 | cp801.prod.do.dsp.mp.microsoft.com | tcp |
| NL | 184.29.205.60:443 | cp801.prod.do.dsp.mp.microsoft.com | tcp |
| NL | 45.91.200.120:80 | tcp | |
| US | 93.184.220.29:80 | tcp | |
| NL | 45.91.200.120:80 | tcp | |
| NL | 45.91.200.120:80 | tcp | |
| NL | 45.91.200.120:80 | tcp | |
| NL | 45.91.200.120:80 | tcp | |
| NL | 45.91.200.120:80 | tcp |
Files
memory/1052-130-0x00000000021B0000-0x000000000221C000-memory.dmp
memory/1052-131-0x0000000000400000-0x0000000000474000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2022-03-05 18:40
Reported
2022-03-05 18:43
Platform
win7-20220223-en
Max time kernel
4294194s
Max time network
142s
Command Line
Signatures
Taurus Stealer
Taurus Stealer Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Reads user/profile data of web browsers
Accesses 2FA software files, possible credential harvesting
Checks installed software on the system
Processes
C:\Users\Admin\AppData\Local\Temp\502572d06c7db1bcaf2b9421ca873055182fb36a51ed5c9b725c6d3e12a66837.exe
"C:\Users\Admin\AppData\Local\Temp\502572d06c7db1bcaf2b9421ca873055182fb36a51ed5c9b725c6d3e12a66837.exe"
Network
| Country | Destination | Domain | Proto |
| NL | 45.91.200.120:80 | tcp | |
| NL | 45.91.200.120:80 | tcp | |
| NL | 45.91.200.120:80 | tcp | |
| NL | 45.91.200.120:80 | tcp | |
| NL | 45.91.200.120:80 | tcp | |
| NL | 45.91.200.120:80 | tcp | |
| NL | 45.91.200.120:80 | tcp |
Files
memory/1116-54-0x0000000075281000-0x0000000075283000-memory.dmp
memory/1116-55-0x0000000000480000-0x00000000004EC000-memory.dmp
memory/1116-56-0x0000000000400000-0x0000000000474000-memory.dmp