General
-
Target
c3cc0a27f51e73dd02f3edf4aa7ca9e51598917c4f667cb1c28784e9d71832df
-
Size
2.0MB
-
Sample
220708-t4abxsacbq
-
MD5
7e2bae3ece76b669fdc4c63cc675dc41
-
SHA1
4d229e583a2e9887388992de8898a7be60e13fc5
-
SHA256
c3cc0a27f51e73dd02f3edf4aa7ca9e51598917c4f667cb1c28784e9d71832df
-
SHA512
36bc6b0af2270c4dd4c8fe3d06fe56edba504fa9e7ee6afde22d2b8ebd82b29f0734d1fe520b771383f1752108311b2ac39ef0fe30e99e017010debb9da5de26
Static task
static1
Behavioral task
behavioral1
Sample
c3cc0a27f51e73dd02f3edf4aa7ca9e51598917c4f667cb1c28784e9d71832df.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
c3cc0a27f51e73dd02f3edf4aa7ca9e51598917c4f667cb1c28784e9d71832df
-
Size
2.0MB
-
MD5
7e2bae3ece76b669fdc4c63cc675dc41
-
SHA1
4d229e583a2e9887388992de8898a7be60e13fc5
-
SHA256
c3cc0a27f51e73dd02f3edf4aa7ca9e51598917c4f667cb1c28784e9d71832df
-
SHA512
36bc6b0af2270c4dd4c8fe3d06fe56edba504fa9e7ee6afde22d2b8ebd82b29f0734d1fe520b771383f1752108311b2ac39ef0fe30e99e017010debb9da5de26
-
Taurus Stealer payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-