General

  • Target

    713d8b36d538fc49ad12220f1fbd338fbf0317afe4280e7851eaa1ab8d5f8a09

  • Size

    310KB

  • Sample

    220420-q6nqjscbf4

  • MD5

    852b4f1e20713d2ffd9323d06e1e35b1

  • SHA1

    e891e6e6b4a087746ffb1bac9b4b264dee09de2e

  • SHA256

    713d8b36d538fc49ad12220f1fbd338fbf0317afe4280e7851eaa1ab8d5f8a09

  • SHA512

    0967f9efd47f04bbb5d6543f48d6b39fea32c3691377b9dbf90fc5078d233de9a342319a5c8d4dd85734b0c97e52e8fe5885d83f51b3dc66577e0c7a09bc1817

Malware Config

Targets

    • Target

      713d8b36d538fc49ad12220f1fbd338fbf0317afe4280e7851eaa1ab8d5f8a09

    • Size

      310KB

    • MD5

      852b4f1e20713d2ffd9323d06e1e35b1

    • SHA1

      e891e6e6b4a087746ffb1bac9b4b264dee09de2e

    • SHA256

      713d8b36d538fc49ad12220f1fbd338fbf0317afe4280e7851eaa1ab8d5f8a09

    • SHA512

      0967f9efd47f04bbb5d6543f48d6b39fea32c3691377b9dbf90fc5078d233de9a342319a5c8d4dd85734b0c97e52e8fe5885d83f51b3dc66577e0c7a09bc1817

    • Taurus Stealer

      Taurus is an infostealer first seen in June 2020.

    • Taurus Stealer Payload

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks