General

  • Target

    FilmoraPromоtiоnVidео.zip

  • Size

    929KB

  • Sample

    230710-df17qshc9x

  • MD5

    e573486521696c506a57fbba7607c3df

  • SHA1

    79e5bb356c1fee9cfac43430ea631384cd81bc0c

  • SHA256

    bdff9dad187f35a29841bf3640584a07cdad2a8f72a908bc29ea99fba549befd

  • SHA512

    0a71a3f6040a510f0b1c3286fac8f071aa65e49d5675d60511df14c7edad553038ba7e03fb293bb5e5c5122586dc2a6d9c0d1e873f3cb5affcf4fe98f60edaaa

  • SSDEEP

    6144:viCFEuVV/RE1aNZnDq1zJa0HqTSbZanmZnK2xPL:vFTfZEOW1VqTSbInYKG

Malware Config

Targets

    • Target

      FilmoraPromоtiоnVidео.scr

    • Size

      690.5MB

    • MD5

      396e65b6305c12f93342ec94e9dbd7b0

    • SHA1

      462ec73a270961e773357222a57540f77c446013

    • SHA256

      92d11ab454c85909e43c2d970b2b19101efd5deb16b5d56957a7eacce2c2052d

    • SHA512

      b51d93a64d43cd5e9f9965cf6ac152df265150f32a22d02deb4085c905ce7baa8796d98dfd9d20768ab0c5ce63def624cde98a8f74b0c4d9b3efdf5c2ef04510

    • SSDEEP

      6144:tK/fF/coWpbk9kwiY7PQHTPy/hHnzhAWNIvZhaj7zMh9gmxY5r:tK/fCfykkEiHzeWNIvZA7IhOmxY5r

    • Taurus Stealer

      Taurus is an infostealer first seen in June 2020.

    • Taurus Stealer payload

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

4
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks