General
-
Target
eeee4c28fa8c2a3d9382c5c7076dd29acae79fd1b18b6aea5a978432d6e5e658
-
Size
402KB
-
Sample
220201-c72rxafecl
-
MD5
f6443a67128d1243bd6691c256f91e24
-
SHA1
647b741f92812137fa79cd9ec17b4439349d84aa
-
SHA256
eeee4c28fa8c2a3d9382c5c7076dd29acae79fd1b18b6aea5a978432d6e5e658
-
SHA512
74884efe5395a12251d0e87e00017181be7d7ef88abb54ce9b7201a1ad7e604cb286e8d721796a532489be71ab40bba098ec06ab9ee2b535228d4c2ea03a2a28
Static task
static1
Behavioral task
behavioral1
Sample
Tax Payment Challan.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Tax Payment Challan.exe
Resource
win10v2004-en-20220113
Malware Config
Targets
-
-
Target
Tax Payment Challan.exe
-
Size
816KB
-
MD5
7179c01d287ea46e21056c636762968e
-
SHA1
a415e62ffb1aa36634d5829e4860440f98623358
-
SHA256
c1a4f8840c7d3c16fa5bb0b52507a501da19dff827fff7b64778f24726d8d5c9
-
SHA512
875034e75889847861f603afada2ea5a7ebc1058e84dea5759dd8528055ad48cfd2b64bca3109721ccc2a16f171b8368649603955d69583380ec1400e5b34dfc
Score10/10-
Kutaki Executable
-
Executes dropped EXE
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-