General

  • Target

    6cd601110963a99dc099bf00018b3d0443cab8716917d5cd3996915788cc0e42

  • Size

    201KB

  • Sample

    220508-t3m7dscdb9

  • MD5

    428f8d8ecb98f2aea81ae0e7e87d400b

  • SHA1

    bd201b0e96ca90ab60db6029c9dc4ddbcf17c603

  • SHA256

    6cd601110963a99dc099bf00018b3d0443cab8716917d5cd3996915788cc0e42

  • SHA512

    d0c59618efea149ad1b79959c034999ec3a0d364b131075a43c0aff2fe7b2022a9c7f86dfa3aab3eb148a689af106db4ba6cec8b77296736a9a258e2811e25ef

Malware Config

Targets

    • Target

      6cd601110963a99dc099bf00018b3d0443cab8716917d5cd3996915788cc0e42

    • Size

      201KB

    • MD5

      428f8d8ecb98f2aea81ae0e7e87d400b

    • SHA1

      bd201b0e96ca90ab60db6029c9dc4ddbcf17c603

    • SHA256

      6cd601110963a99dc099bf00018b3d0443cab8716917d5cd3996915788cc0e42

    • SHA512

      d0c59618efea149ad1b79959c034999ec3a0d364b131075a43c0aff2fe7b2022a9c7f86dfa3aab3eb148a689af106db4ba6cec8b77296736a9a258e2811e25ef

    • Taurus Stealer

      Taurus is an infostealer first seen in June 2020.

    • Taurus Stealer Payload

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks