General

  • Target

    49dd1543bfee5615840f41c345db942cc0e8ed457a2aaaf9c2675aaf72872701

  • Size

    344KB

  • Sample

    220516-twrk8sddfr

  • MD5

    b3fad346307496a5c2bae39e984e77bd

  • SHA1

    5d291bb4318d74ab00ee818bb43f5b91d6ca84cc

  • SHA256

    49dd1543bfee5615840f41c345db942cc0e8ed457a2aaaf9c2675aaf72872701

  • SHA512

    f04c16fc0208f37af50d9c9f991beff799fca269cabd5c8d188e15cdf7b3bf90c0eac11e6478d92d0b07e8ab3fdb02a0008e916aa8eee3f6b98925a57258ddb2

Malware Config

Targets

    • Target

      49dd1543bfee5615840f41c345db942cc0e8ed457a2aaaf9c2675aaf72872701

    • Size

      344KB

    • MD5

      b3fad346307496a5c2bae39e984e77bd

    • SHA1

      5d291bb4318d74ab00ee818bb43f5b91d6ca84cc

    • SHA256

      49dd1543bfee5615840f41c345db942cc0e8ed457a2aaaf9c2675aaf72872701

    • SHA512

      f04c16fc0208f37af50d9c9f991beff799fca269cabd5c8d188e15cdf7b3bf90c0eac11e6478d92d0b07e8ab3fdb02a0008e916aa8eee3f6b98925a57258ddb2

    • Taurus Stealer

      Taurus is an infostealer first seen in June 2020.

    • Taurus Stealer Payload

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks