General

  • Target

    36737eab0ddba1c6c9244a3ce4149a0963eb2d505a8b25a4de8ba720d8c57d78

  • Size

    669KB

  • Sample

    220502-sccgjafeb9

  • MD5

    edbc0dd22c59bf1c8db6bb39493edf11

  • SHA1

    4a09426d520b7929f08ea77241013008780ab998

  • SHA256

    36737eab0ddba1c6c9244a3ce4149a0963eb2d505a8b25a4de8ba720d8c57d78

  • SHA512

    9189b4dc39ea0a50e76309311098d7bfe3058892f2b01d69e3cbf48d357ede481318bf422104508b0449b604c5658311e0cf58b72506e84a906771518485a405

Malware Config

Targets

    • Target

      36737eab0ddba1c6c9244a3ce4149a0963eb2d505a8b25a4de8ba720d8c57d78

    • Size

      669KB

    • MD5

      edbc0dd22c59bf1c8db6bb39493edf11

    • SHA1

      4a09426d520b7929f08ea77241013008780ab998

    • SHA256

      36737eab0ddba1c6c9244a3ce4149a0963eb2d505a8b25a4de8ba720d8c57d78

    • SHA512

      9189b4dc39ea0a50e76309311098d7bfe3058892f2b01d69e3cbf48d357ede481318bf422104508b0449b604c5658311e0cf58b72506e84a906771518485a405

    • Taurus Stealer

      Taurus is an infostealer first seen in June 2020.

    • Taurus Stealer Payload

    • Accesses 2FA software files, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks