General

  • Target

    79d48a3ed0f3334a06f5d320f065a9ce66a26c38d6449358660a2461c34af7c7

  • Size

    332KB

  • Sample

    220630-yele4sadam

  • MD5

    f9a8972e51526c201f2376de26c1cc7a

  • SHA1

    71691fdd0db1ac9d62484f49c3deed078d47ceda

  • SHA256

    79d48a3ed0f3334a06f5d320f065a9ce66a26c38d6449358660a2461c34af7c7

  • SHA512

    471b66003460a34ef5bced228106f64293d2940448541587b0bdb24200df0dcd57ce63fb1d900bfc86a50be8bb5fccad7a352b3c9e80ae9d5c534ca96b8dcdf3

Malware Config

Targets

    • Target

      79d48a3ed0f3334a06f5d320f065a9ce66a26c38d6449358660a2461c34af7c7

    • Size

      332KB

    • MD5

      f9a8972e51526c201f2376de26c1cc7a

    • SHA1

      71691fdd0db1ac9d62484f49c3deed078d47ceda

    • SHA256

      79d48a3ed0f3334a06f5d320f065a9ce66a26c38d6449358660a2461c34af7c7

    • SHA512

      471b66003460a34ef5bced228106f64293d2940448541587b0bdb24200df0dcd57ce63fb1d900bfc86a50be8bb5fccad7a352b3c9e80ae9d5c534ca96b8dcdf3

    • Taurus Stealer

      Taurus is an infostealer first seen in June 2020.

    • Taurus Stealer Payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks