Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
19-04-2022 12:38
Static task
static1
Behavioral task
behavioral1
Sample
7670bee1b28980e27f0800ec047284fa59799ad67922b617510f6b2256d9f79d.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
7670bee1b28980e27f0800ec047284fa59799ad67922b617510f6b2256d9f79d.exe
-
Size
333KB
-
MD5
acb92f7694272acf1d8d3662016069c1
-
SHA1
53408b411de5d99a615ee7b6855957d7342d3bca
-
SHA256
7670bee1b28980e27f0800ec047284fa59799ad67922b617510f6b2256d9f79d
-
SHA512
e4e5cf0148e77df316c95f4e1b75f73903c4f4e68043cd9ed298da8a7b5701461331a035bc25803be6719606338762c755fedcaf66341cb73948f61ed176bad6
Malware Config
Signatures
-
Taurus Stealer Payload 1 IoCs
resource yara_rule behavioral1/memory/1932-56-0x0000000000400000-0x0000000000494000-memory.dmp family_taurus_stealer -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.