Analysis
-
max time kernel
155s -
max time network
170s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
19-04-2022 12:20
Static task
static1
Behavioral task
behavioral1
Sample
8e5ff8524b5173cac14b26aa4ddee01cad6e50629818e467f1e92ad5947f2240.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
8e5ff8524b5173cac14b26aa4ddee01cad6e50629818e467f1e92ad5947f2240.exe
-
Size
326KB
-
MD5
199eb1788868ac414bcbac0e2f18ca0f
-
SHA1
324290f7a1db6edc4f68cbb4ebb9a40a0fd35415
-
SHA256
8e5ff8524b5173cac14b26aa4ddee01cad6e50629818e467f1e92ad5947f2240
-
SHA512
a04476686bcf9c8baae61065a302ccadf35a76b316d949941bf391e8c133144fe648646406cb3cfcfb60bef37bec6e79f954fa7f68712b735b7bc36a4fd84cdf
Malware Config
Signatures
-
Taurus Stealer Payload 2 IoCs
resource yara_rule behavioral1/memory/2036-57-0x0000000000220000-0x0000000000256000-memory.dmp family_taurus_stealer behavioral1/memory/2036-58-0x0000000000400000-0x000000000230D000-memory.dmp family_taurus_stealer -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.