Analysis
-
max time kernel
171s -
max time network
200s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 17:34
Static task
static1
Behavioral task
behavioral1
Sample
4734f6cd792df420b26a864fd71085393511fb4c6b0dd2017ebb3fd3897ec638.exe
Resource
win7-20221111-en
General
-
Target
4734f6cd792df420b26a864fd71085393511fb4c6b0dd2017ebb3fd3897ec638.exe
-
Size
582KB
-
MD5
28a732a1d13cae5e3a500bd4c5f9c8e8
-
SHA1
4ea2adab7eaedffc9e9ccc5ef49185fa55588652
-
SHA256
4734f6cd792df420b26a864fd71085393511fb4c6b0dd2017ebb3fd3897ec638
-
SHA512
8559eda66ccdab68676217e8467f554a0704ce62bd258c3acee9683de96d21fcd181a2ecbbaac5e26d224c908b6f9ce92bbdcb1e495e332c86a890f7e86a40ce
-
SSDEEP
6144:F/cVnKFOhm+1B+lWEOZAoFPz0OhRtLbTqY3SaJg0Hfr5FbuZ6ViHJO:F8kqXZAoFQYRtn2YiaJt/r5FbnVeO
Malware Config
Signatures
-
Taurus Stealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2024-57-0x0000000000400000-0x0000000000493000-memory.dmp family_taurus_stealer behavioral1/memory/2024-58-0x0000000000400000-0x0000000000493000-memory.dmp family_taurus_stealer -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.