General

  • Target

    a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659

  • Size

    884KB

  • Sample

    220329-yrdwssegaj

  • MD5

    5d481b1a50c3d6477180f413f1b5597c

  • SHA1

    3cb1c4f6622fbd6b591fd3f50fa18664c6d9d0ca

  • SHA256

    a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659

  • SHA512

    d0ec083a97be0ce6fa33cf6dd3e424e1f939fded0dbaebed0f66c7871071cfc355c8da117726fd9328537595b6ca641f4dc7419baf7f105cf018a3deed5f1f0c

Malware Config

Targets

    • Target

      a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659

    • Size

      884KB

    • MD5

      5d481b1a50c3d6477180f413f1b5597c

    • SHA1

      3cb1c4f6622fbd6b591fd3f50fa18664c6d9d0ca

    • SHA256

      a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659

    • SHA512

      d0ec083a97be0ce6fa33cf6dd3e424e1f939fded0dbaebed0f66c7871071cfc355c8da117726fd9328537595b6ca641f4dc7419baf7f105cf018a3deed5f1f0c

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks