General
-
Target
45aecd6123f928ed68dd96ff464e22bdcd92ff3872159649edf8a082bbaa5d8c
-
Size
300KB
-
Sample
220205-haw32shahr
-
MD5
453db202ff5606e4a28dd8d168b7bf1a
-
SHA1
806a1e8bde11304541d6d395e649ad6813f467ff
-
SHA256
45aecd6123f928ed68dd96ff464e22bdcd92ff3872159649edf8a082bbaa5d8c
-
SHA512
87b23c1ce682d43e945c6eb1f34a84be5f019928badf887acfc796ba1f7782f1948ab5b029f65dfa5eb72db88d12a5c8d069d0aef0db6b4bbe2b688a1a3cd11b
Static task
static1
Behavioral task
behavioral1
Sample
Payment Invoice.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Payment Invoice.exe
Resource
win10v2004-en-20220113
Malware Config
Targets
-
-
Target
Payment Invoice.exe
-
Size
376KB
-
MD5
a7f37abc65de8b02ac67af17a289ad69
-
SHA1
6d271d0f377728657f4c284253cdc51faa3fdb5c
-
SHA256
7dfb08f5a669070d545d5e1e4d72c27b8c80d9c95820e441bbbacf1e9dd4aa31
-
SHA512
fec499c6dc1f5bbef6f36aa90cbbe35217633ebbafad5429af229a72909445273cecfb0c5b109bec680f54663d51d3b9fa4376c6926c56ef81112d32c8737f3b
Score10/10-
Kutaki Executable
-
Executes dropped EXE
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-