General

  • Target

    b105f80b6a96c445686712dc719c1b779a28903ac8477fdcf67c8cb82f398efb

  • Size

    423KB

  • Sample

    220508-h9p4saeaak

  • MD5

    1529a6e5ba1a853ea750b9fd1981ba5a

  • SHA1

    33e2de0a85e6212c774cc04f9c0a49a1c9d769e3

  • SHA256

    b105f80b6a96c445686712dc719c1b779a28903ac8477fdcf67c8cb82f398efb

  • SHA512

    7d40e8986a8feaff0b6c55f23347074b96b4b555fb7e6f890fbd6165e7e83b290b020ab96596715f743a5b7793de02118c1558b984744f86f2752e47bc1cce0e

Malware Config

Targets

    • Target

      b105f80b6a96c445686712dc719c1b779a28903ac8477fdcf67c8cb82f398efb

    • Size

      423KB

    • MD5

      1529a6e5ba1a853ea750b9fd1981ba5a

    • SHA1

      33e2de0a85e6212c774cc04f9c0a49a1c9d769e3

    • SHA256

      b105f80b6a96c445686712dc719c1b779a28903ac8477fdcf67c8cb82f398efb

    • SHA512

      7d40e8986a8feaff0b6c55f23347074b96b4b555fb7e6f890fbd6165e7e83b290b020ab96596715f743a5b7793de02118c1558b984744f86f2752e47bc1cce0e

    • Taurus Stealer

      Taurus is an infostealer first seen in June 2020.

    • Taurus Stealer Payload

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks