General
-
Target
3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4
-
Size
787KB
-
Sample
220511-bb3tnacbd8
-
MD5
73485f0a753288ff5f7b4a62ecbf051d
-
SHA1
cf9e21945490fb9a64d5414d0683da0b770059b0
-
SHA256
3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4
-
SHA512
ecd43dd38927343c458f10ef5fa560560f73f59faf7fcf0708ea8422c1551539a3aa781342f24bdeb83fb47b9c13e06eb7e1e546a845783ec3b7a16bd97ecf70
Static task
static1
Behavioral task
behavioral1
Sample
3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4
-
Size
787KB
-
MD5
73485f0a753288ff5f7b4a62ecbf051d
-
SHA1
cf9e21945490fb9a64d5414d0683da0b770059b0
-
SHA256
3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4
-
SHA512
ecd43dd38927343c458f10ef5fa560560f73f59faf7fcf0708ea8422c1551539a3aa781342f24bdeb83fb47b9c13e06eb7e1e546a845783ec3b7a16bd97ecf70
-
Taurus Stealer Payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-