General
-
Target
dce64085ee0d7e6a009dd91f4054aa7030b3eb9bafde8a1d9eaef92e2910c513
-
Size
2.4MB
-
Sample
220630-3w4p8sdadl
-
MD5
29f6d860548f5004e781b2f703f2c1ad
-
SHA1
041f4b64fe2e4438dab01d48116447b28145a083
-
SHA256
dce64085ee0d7e6a009dd91f4054aa7030b3eb9bafde8a1d9eaef92e2910c513
-
SHA512
aeac8becc920bb13573be80a3159f50beb464c53295ec125b0cb0543978d50f6d62e58e8104dda76cac66cdf6ceb2b5ed640a6940bc315fd19d796604ab34c46
Static task
static1
Behavioral task
behavioral1
Sample
dce64085ee0d7e6a009dd91f4054aa7030b3eb9bafde8a1d9eaef92e2910c513.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
dce64085ee0d7e6a009dd91f4054aa7030b3eb9bafde8a1d9eaef92e2910c513
-
Size
2.4MB
-
MD5
29f6d860548f5004e781b2f703f2c1ad
-
SHA1
041f4b64fe2e4438dab01d48116447b28145a083
-
SHA256
dce64085ee0d7e6a009dd91f4054aa7030b3eb9bafde8a1d9eaef92e2910c513
-
SHA512
aeac8becc920bb13573be80a3159f50beb464c53295ec125b0cb0543978d50f6d62e58e8104dda76cac66cdf6ceb2b5ed640a6940bc315fd19d796604ab34c46
-
Taurus Stealer Payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-