General

  • Target

    1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c

  • Size

    2.2MB

  • Sample

    220420-emah2aaea9

  • MD5

    a8db0614d948db39b865c1efa5d9eabc

  • SHA1

    4f9561138254cbbde7b8f5a0bf1798d3c2a10bda

  • SHA256

    1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c

  • SHA512

    0641650fef34bdfc9de12ab1c02c12cf0e9d30eb1e525cf60eec5c0470614b6d7b7203c58761ba11338fd461570b6ab49e4d63e90b4f9270ee8eb142c4319a70

Malware Config

Targets

    • Target

      1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c

    • Size

      2.2MB

    • MD5

      a8db0614d948db39b865c1efa5d9eabc

    • SHA1

      4f9561138254cbbde7b8f5a0bf1798d3c2a10bda

    • SHA256

      1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c

    • SHA512

      0641650fef34bdfc9de12ab1c02c12cf0e9d30eb1e525cf60eec5c0470614b6d7b7203c58761ba11338fd461570b6ab49e4d63e90b4f9270ee8eb142c4319a70

    • Taurus Stealer

      Taurus is an infostealer first seen in June 2020.

    • Taurus Stealer Payload

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks