General

  • Target

    8523a03188911d6b07fd467ae4a6df79a139c746345031941a8b4a6da369275f

  • Size

    720KB

  • Sample

    220516-p5gp6sccf3

  • MD5

    971c48d6dc3f593485bf2577266d2da7

  • SHA1

    a9d1b83dd950414be286ec41365ac9b6bfe1bcbf

  • SHA256

    8523a03188911d6b07fd467ae4a6df79a139c746345031941a8b4a6da369275f

  • SHA512

    89229a9e4fb51ef1e7aba83703bd08677a59c416136cb6d5c5df0804e4481c48d655bbc394295eb1858a2de0994e63b3daf67ed9678bc948be4aa6b159606819

Malware Config

Targets

    • Target

      8523a03188911d6b07fd467ae4a6df79a139c746345031941a8b4a6da369275f

    • Size

      720KB

    • MD5

      971c48d6dc3f593485bf2577266d2da7

    • SHA1

      a9d1b83dd950414be286ec41365ac9b6bfe1bcbf

    • SHA256

      8523a03188911d6b07fd467ae4a6df79a139c746345031941a8b4a6da369275f

    • SHA512

      89229a9e4fb51ef1e7aba83703bd08677a59c416136cb6d5c5df0804e4481c48d655bbc394295eb1858a2de0994e63b3daf67ed9678bc948be4aa6b159606819

    • Taurus Stealer

      Taurus is an infostealer first seen in June 2020.

    • Taurus Stealer Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks