MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4245088e2600188006929bc88f455b57e849ef1748c0bda3e9bd3c4dd23ae017. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TaurusStealer


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 4245088e2600188006929bc88f455b57e849ef1748c0bda3e9bd3c4dd23ae017
SHA3-384 hash: 090bed5f68a20bc58ff9d9384a5e9176ae9949122705028aec45e4f0abe08f7157624f5bf3dab2b1389ea7c8f6dd8585
SHA1 hash: 0f79bd426cfdbec95a7e0e80abcc315308aa7482
MD5 hash: 04a983eb92baac0796e521b69b784d34
humanhash: enemy-alabama-south-edward
File name:Predator Stealer
Download: download sample
Signature TaurusStealer
File size:345'600 bytes
First seen:2020-06-26 10:55:45 UTC
Last seen:2020-06-26 11:34:30 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash d1806f06cfd7d457d67a0e9018af83d7 (1 x TaurusStealer)
ssdeep 6144:aPDbZMKXbZm3VS4vzjTHQ7/eybn6ASv4Yn4uMD4tiIFkh:i/atIfL6AHluMD4XFkh
Threatray 10 similar samples on MalwareBazaar
TLSH 32744A326F414431E3130132E8649AA445686D240D2189B3B7FA7D1AF6E7CBEDD13FAB
Reporter JAMESWT_WT
Tags:Predator TaurusStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
206
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Containing strings that indicate a threat
Sending an HTTP POST request
Creating a window
Reading critical registry keys
Reading Telegram data
Stealing user critical data
Threat name:
Win32.Trojan.Predator
Status:
Malicious
First seen:
2020-06-26 10:55:26 UTC
File Type:
PE (Exe)
Extracted files:
10
AV detection:
27 of 42 (64.29%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
spyware discovery
Behaviour
Checks for installed software on the system
Reads user/profile data of web browsers
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments