General

  • Target

    486a1c750e1d394c23f2df90780932b8f14218d4bdd8a04ec5ca5b375fdd11d1

  • Size

    207KB

  • Sample

    220427-svl4pabad2

  • MD5

    4733c95ac78953fe06c84aec8ad2a909

  • SHA1

    fd8ee63967fa43647e556c5bfeea7a698077149d

  • SHA256

    486a1c750e1d394c23f2df90780932b8f14218d4bdd8a04ec5ca5b375fdd11d1

  • SHA512

    d579431383deaf63c0279d3d48bfd215e889521d5ba0d9b0ef9cc95e66d01dde5f875add9661d2f22caf02009a231f5e6c37cff6f3545fd13b6655223d1a95dc

Malware Config

Targets

    • Target

      486a1c750e1d394c23f2df90780932b8f14218d4bdd8a04ec5ca5b375fdd11d1

    • Size

      207KB

    • MD5

      4733c95ac78953fe06c84aec8ad2a909

    • SHA1

      fd8ee63967fa43647e556c5bfeea7a698077149d

    • SHA256

      486a1c750e1d394c23f2df90780932b8f14218d4bdd8a04ec5ca5b375fdd11d1

    • SHA512

      d579431383deaf63c0279d3d48bfd215e889521d5ba0d9b0ef9cc95e66d01dde5f875add9661d2f22caf02009a231f5e6c37cff6f3545fd13b6655223d1a95dc

    • Taurus Stealer

      Taurus is an infostealer first seen in June 2020.

    • Taurus Stealer Payload

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks