General
-
Target
874f08f05b9ee2fd92c514a5b2be371a012dcc4d791d3406187968f5b0eb4288
-
Size
401KB
-
Sample
220221-na59lshgg7
-
MD5
f2eac8dc1fc602439a792e0e66015f40
-
SHA1
95342ea854315cc31b27f1047d5a013de3cdcf23
-
SHA256
874f08f05b9ee2fd92c514a5b2be371a012dcc4d791d3406187968f5b0eb4288
-
SHA512
bff96c78e616c9957dc6c6d4ea34bc94a8dd6544d36b3e964f9a94cd37714f497997ce68d724a3bd63b2affc1049d1e1fc1a50b387f6575dc04e101e7d2d5c34
Static task
static1
Behavioral task
behavioral1
Sample
Payment.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Payment.exe
Resource
win10v2004-en-20220112
Malware Config
Targets
-
-
Target
Payment.exe
-
Size
752KB
-
MD5
55cb3b1b1f6fcb56f0e8d26cb8a4b8f2
-
SHA1
ce7013abac9be7c9ad1b700e8a3c735b97392819
-
SHA256
8179d2c371934e7f748fdf033d96a3b527158348e87ec21f1576136ede5d2d17
-
SHA512
a7c8e2f47bada4a62dca21ce900ad71dcdcf61011873e494603970102e9fbcb0fc8365c437c1c5f3f1f946cd78a6fc2a243df641b75df72b85910f06b98890f2
-
Kutaki Executable
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-