General

  • Target

    6ece85df70b719e572aa076519be6d92_JaffaCakes118

  • Size

    271KB

  • Sample

    240730-ck88gaselk

  • MD5

    6ece85df70b719e572aa076519be6d92

  • SHA1

    d89a7bd8b0d43f2c6046e1754d3bcab4ac821b4f

  • SHA256

    84f6fd5103bfa97b8479af5a6db82100149167690502bb0231e6832fc463af13

  • SHA512

    1a1ad7acddae67ab79c2b3f66b8cbe95b9da11b1e32909d36ec5d052e1a60d7d1da69cd8951b2652954c9f783e803209ebc0670e9aaea4e1aab7e1a5a98f4bee

  • SSDEEP

    3072:YMwFHbXSNziyqoIx+atQHatf7v32oyx8H/wAgmGPVFnelfw40QadDc5D0bn2XwbR:vUSziF37tNba+dgxV9ep70bdDcllBY

Malware Config

Targets

    • Target

      6ece85df70b719e572aa076519be6d92_JaffaCakes118

    • Size

      271KB

    • MD5

      6ece85df70b719e572aa076519be6d92

    • SHA1

      d89a7bd8b0d43f2c6046e1754d3bcab4ac821b4f

    • SHA256

      84f6fd5103bfa97b8479af5a6db82100149167690502bb0231e6832fc463af13

    • SHA512

      1a1ad7acddae67ab79c2b3f66b8cbe95b9da11b1e32909d36ec5d052e1a60d7d1da69cd8951b2652954c9f783e803209ebc0670e9aaea4e1aab7e1a5a98f4bee

    • SSDEEP

      3072:YMwFHbXSNziyqoIx+atQHatf7v32oyx8H/wAgmGPVFnelfw40QadDc5D0bn2XwbR:vUSziF37tNba+dgxV9ep70bdDcllBY

    • Taurus Stealer

      Taurus is an infostealer first seen in June 2020.

    • Taurus Stealer payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Deletes itself

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks