General

  • Target

    280eb1d9d24fb1029b5d08f72fe3a0cf627fcac877fd2c03a5b39ee5e462cef6

  • Size

    257KB

  • Sample

    220503-ayppwadfc9

  • MD5

    6bab2d5b4e14be0c45913fd332bcc6a6

  • SHA1

    b957c16ecc370ddb35141546471dd9bb180b86ab

  • SHA256

    280eb1d9d24fb1029b5d08f72fe3a0cf627fcac877fd2c03a5b39ee5e462cef6

  • SHA512

    043ce6f6d64814b7326d14d552f2db9dcc2d9cd6efa926b2f40b757d43bf8abf75fd3c76c9ab69f748a3339ec2014a2a54f51544d944dd048491fa517f96b985

Malware Config

Targets

    • Target

      280eb1d9d24fb1029b5d08f72fe3a0cf627fcac877fd2c03a5b39ee5e462cef6

    • Size

      257KB

    • MD5

      6bab2d5b4e14be0c45913fd332bcc6a6

    • SHA1

      b957c16ecc370ddb35141546471dd9bb180b86ab

    • SHA256

      280eb1d9d24fb1029b5d08f72fe3a0cf627fcac877fd2c03a5b39ee5e462cef6

    • SHA512

      043ce6f6d64814b7326d14d552f2db9dcc2d9cd6efa926b2f40b757d43bf8abf75fd3c76c9ab69f748a3339ec2014a2a54f51544d944dd048491fa517f96b985

    • Taurus Stealer

      Taurus is an infostealer first seen in June 2020.

    • Taurus Stealer Payload

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks