General

  • Target

    30ae864bbb52f134f172124ee1e229bb

  • Size

    410KB

  • Sample

    211229-kvhr9sdccm

  • MD5

    30ae864bbb52f134f172124ee1e229bb

  • SHA1

    51a6900cc21b599759d42ab6b506bba0c729655d

  • SHA256

    1810e76a7f52cbb783412b2aeb93298fd31e3fd59e66cca317e16bd1079e9c71

  • SHA512

    a36ccdd84c60434b73d8a7b09e605f46be00d9dd5aafeee7e6f10c61d1e3b81946927c040d5eff152720521475ce4f32c7659b7889c39785d59b556c52bd0f1d

Malware Config

Targets

    • Target

      image.exe

    • Size

      516KB

    • MD5

      c43b7d74eef3fa1c025f08939e9d4be2

    • SHA1

      0b41411bd1f52c115d77fc44815beed1b3cb749c

    • SHA256

      d0fd86e3254a14f3b99d141b8512eae447cd716436ba8a192422596a2b0bb625

    • SHA512

      9104a982f97370c03a95955b86bd9c37681d2c5aed2ba46ed0f113d915dbd83b1d237c6c5b128e24c7a3a3dc01c11fded5ef9eecf217255da98dd0eea5ee4d3d

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks