General

  • Target

    3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f

  • Size

    561KB

  • Sample

    220511-c7r8gagfcm

  • MD5

    f8150dbb66a9dd18903253fb1855ddbf

  • SHA1

    705dacea137f1336a250388b719cc878af49ea91

  • SHA256

    3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f

  • SHA512

    9a8d6185d316757617f7433c8cc9e3ed74dabd1c08ee31fc01eb4d403eddafb9a6c228187e39641167e4913ca819da699393d80bcacd3a205ae823b7cc9bfc2b

Malware Config

Targets

    • Target

      3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f

    • Size

      561KB

    • MD5

      f8150dbb66a9dd18903253fb1855ddbf

    • SHA1

      705dacea137f1336a250388b719cc878af49ea91

    • SHA256

      3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f

    • SHA512

      9a8d6185d316757617f7433c8cc9e3ed74dabd1c08ee31fc01eb4d403eddafb9a6c228187e39641167e4913ca819da699393d80bcacd3a205ae823b7cc9bfc2b

    • Taurus Stealer

      Taurus is an infostealer first seen in June 2020.

    • Taurus Stealer Payload

    • Accesses 2FA software files, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks