PRODUCT SAMPLE & ORDER SHEET.PDF.scr

General
Target

PRODUCT SAMPLE & ORDER SHEET.PDF.scr

Size

488KB

Sample

210426-kz1aw3evej

Score
10 /10
MD5

85f51ff6bd810b0122a2c38eef70fa06

SHA1

aa49ffa7db0c118b644b62d75a0cc27b62a680aa

SHA256

6bc635e6ac09b880a389ddf37ceaae81cb38fd81b3966ca1656b65c7d0f4d8fd

SHA512

e20cc0744e2d3378958990e27ce59f25787f3133a67e4f0d21d63d7da1fc56ef9b2a297303f723a9408f24d3321931a45ecfcc70d6a19b954eab04602c3f4698

Malware Config
Targets
Target

PRODUCT SAMPLE & ORDER SHEET.PDF.scr

MD5

85f51ff6bd810b0122a2c38eef70fa06

Filesize

488KB

Score
10 /10
SHA1

aa49ffa7db0c118b644b62d75a0cc27b62a680aa

SHA256

6bc635e6ac09b880a389ddf37ceaae81cb38fd81b3966ca1656b65c7d0f4d8fd

SHA512

e20cc0744e2d3378958990e27ce59f25787f3133a67e4f0d21d63d7da1fc56ef9b2a297303f723a9408f24d3321931a45ecfcc70d6a19b954eab04602c3f4698

Tags

Signatures

  • Kutaki

    Description

    Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    Tags

  • Kutaki Executable

  • Executes dropped EXE

  • Drops startup file

  • Loads dropped DLL

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
        Execution
          Exfiltration
            Impact
              Initial Access
                Lateral Movement
                  Persistence
                    Privilege Escalation
                      Tasks

                      static1

                      behavioral1

                      10/10

                      behavioral2

                      10/10