General

  • Target

    0b9f635e4fdcd604301232cbf99882303bded31ab572e692b688f10cac5677a0.bin

  • Size

    344KB

  • Sample

    220715-gyvz8ahbd8

  • MD5

    8ae3e9c831721116174321d4edb76b42

  • SHA1

    b21b1c681e8258fc6ddda02121171c0dbe85a6b9

  • SHA256

    0b9f635e4fdcd604301232cbf99882303bded31ab572e692b688f10cac5677a0

  • SHA512

    50cfe6223a49aee036fece9ef4e44bbc31c3f2f510fb5cabdb5203a4f0332a2d0ec28561fe525c0dbe11deacafc20381feba7926aade00f426736c8d398d5b08

Malware Config

Targets

    • Target

      0b9f635e4fdcd604301232cbf99882303bded31ab572e692b688f10cac5677a0.bin

    • Size

      344KB

    • MD5

      8ae3e9c831721116174321d4edb76b42

    • SHA1

      b21b1c681e8258fc6ddda02121171c0dbe85a6b9

    • SHA256

      0b9f635e4fdcd604301232cbf99882303bded31ab572e692b688f10cac5677a0

    • SHA512

      50cfe6223a49aee036fece9ef4e44bbc31c3f2f510fb5cabdb5203a4f0332a2d0ec28561fe525c0dbe11deacafc20381feba7926aade00f426736c8d398d5b08

    • Taurus Stealer

      Taurus is an infostealer first seen in June 2020.

    • Taurus Stealer payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks