General

  • Target

    bcc1140c693034f8d9683d4cb0943b72566985b89c4f080c4f953317a9f79673

  • Size

    324KB

  • Sample

    220508-tawm3abcb7

  • MD5

    8518c709d0e64df3e63585cfcd33babf

  • SHA1

    dc16e4941ce319e715ccc2f2d24289288f8f1596

  • SHA256

    bcc1140c693034f8d9683d4cb0943b72566985b89c4f080c4f953317a9f79673

  • SHA512

    26d8ce100a421a1b644db72025a7b974d2e22d775200e213a4ed28892e2c968d704f07df343316850c5d358720b25583733b2c72e8b2bef5e84c303944bbe34a

Malware Config

Targets

    • Target

      bcc1140c693034f8d9683d4cb0943b72566985b89c4f080c4f953317a9f79673

    • Size

      324KB

    • MD5

      8518c709d0e64df3e63585cfcd33babf

    • SHA1

      dc16e4941ce319e715ccc2f2d24289288f8f1596

    • SHA256

      bcc1140c693034f8d9683d4cb0943b72566985b89c4f080c4f953317a9f79673

    • SHA512

      26d8ce100a421a1b644db72025a7b974d2e22d775200e213a4ed28892e2c968d704f07df343316850c5d358720b25583733b2c72e8b2bef5e84c303944bbe34a

    • Taurus Stealer

      Taurus is an infostealer first seen in June 2020.

    • Taurus Stealer Payload

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks