General

  • Target

    a47bd76b1a8fad38780fb7d983d6634d565c42c6da702eb630218fcab05a2e4a

  • Size

    340KB

  • Sample

    220708-tb19yagfhr

  • MD5

    2698acb7cbe77cc6fe1c91b9ae6a094a

  • SHA1

    1b248628cd297083f9ba7a74f03aa62ed43d4bd1

  • SHA256

    a47bd76b1a8fad38780fb7d983d6634d565c42c6da702eb630218fcab05a2e4a

  • SHA512

    12ea18d4b8ad3853e5200c6bf552c5d45f2dc5678ed8fdf31ac99a56f9fd913068a0f5b9fd758a4452b2f11ba84283398f674028cb269e27536fef373c9b82d6

Malware Config

Targets

    • Target

      a47bd76b1a8fad38780fb7d983d6634d565c42c6da702eb630218fcab05a2e4a

    • Size

      340KB

    • MD5

      2698acb7cbe77cc6fe1c91b9ae6a094a

    • SHA1

      1b248628cd297083f9ba7a74f03aa62ed43d4bd1

    • SHA256

      a47bd76b1a8fad38780fb7d983d6634d565c42c6da702eb630218fcab05a2e4a

    • SHA512

      12ea18d4b8ad3853e5200c6bf552c5d45f2dc5678ed8fdf31ac99a56f9fd913068a0f5b9fd758a4452b2f11ba84283398f674028cb269e27536fef373c9b82d6

    • Taurus Stealer

      Taurus is an infostealer first seen in June 2020.

    • Taurus Stealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks