General

  • Target

    eeee4c28fa8c2a3d9382c5c7076dd29acae79fd1b18b6aea5a978432d6e5e658

  • Size

    402KB

  • Sample

    220201-c72rxafecl

  • MD5

    f6443a67128d1243bd6691c256f91e24

  • SHA1

    647b741f92812137fa79cd9ec17b4439349d84aa

  • SHA256

    eeee4c28fa8c2a3d9382c5c7076dd29acae79fd1b18b6aea5a978432d6e5e658

  • SHA512

    74884efe5395a12251d0e87e00017181be7d7ef88abb54ce9b7201a1ad7e604cb286e8d721796a532489be71ab40bba098ec06ab9ee2b535228d4c2ea03a2a28

Malware Config

Targets

    • Target

      Tax Payment Challan.exe

    • Size

      816KB

    • MD5

      7179c01d287ea46e21056c636762968e

    • SHA1

      a415e62ffb1aa36634d5829e4860440f98623358

    • SHA256

      c1a4f8840c7d3c16fa5bb0b52507a501da19dff827fff7b64778f24726d8d5c9

    • SHA512

      875034e75889847861f603afada2ea5a7ebc1058e84dea5759dd8528055ad48cfd2b64bca3109721ccc2a16f171b8368649603955d69583380ec1400e5b34dfc

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks