General

  • Target

    c3cc0a27f51e73dd02f3edf4aa7ca9e51598917c4f667cb1c28784e9d71832df

  • Size

    2.0MB

  • Sample

    220708-t4abxsacbq

  • MD5

    7e2bae3ece76b669fdc4c63cc675dc41

  • SHA1

    4d229e583a2e9887388992de8898a7be60e13fc5

  • SHA256

    c3cc0a27f51e73dd02f3edf4aa7ca9e51598917c4f667cb1c28784e9d71832df

  • SHA512

    36bc6b0af2270c4dd4c8fe3d06fe56edba504fa9e7ee6afde22d2b8ebd82b29f0734d1fe520b771383f1752108311b2ac39ef0fe30e99e017010debb9da5de26

Malware Config

Targets

    • Target

      c3cc0a27f51e73dd02f3edf4aa7ca9e51598917c4f667cb1c28784e9d71832df

    • Size

      2.0MB

    • MD5

      7e2bae3ece76b669fdc4c63cc675dc41

    • SHA1

      4d229e583a2e9887388992de8898a7be60e13fc5

    • SHA256

      c3cc0a27f51e73dd02f3edf4aa7ca9e51598917c4f667cb1c28784e9d71832df

    • SHA512

      36bc6b0af2270c4dd4c8fe3d06fe56edba504fa9e7ee6afde22d2b8ebd82b29f0734d1fe520b771383f1752108311b2ac39ef0fe30e99e017010debb9da5de26

    • Taurus Stealer

      Taurus is an infostealer first seen in June 2020.

    • Taurus Stealer payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks