General

  • Target

    976ef2ef359ebd6fff5e206f9586d17bab0ee5e4d1bfe9334cc33a3986365f4a

  • Size

    1.1MB

  • Sample

    220329-yrjr2safa8

  • MD5

    89070447b67e5906a567c61c88024e9c

  • SHA1

    1953e631b3b7cc106d2c34dfe5d4bc95d0c458e5

  • SHA256

    976ef2ef359ebd6fff5e206f9586d17bab0ee5e4d1bfe9334cc33a3986365f4a

  • SHA512

    2b2c3d5306e10ea7e93e6aeaa0240d4fca5d91aa5186b49e1a7493b58efa90373f072762ab12c395b86d6153cee070e9e1f3948702a12357f983e7228ddf28a8

Malware Config

Targets

    • Target

      976ef2ef359ebd6fff5e206f9586d17bab0ee5e4d1bfe9334cc33a3986365f4a

    • Size

      1.1MB

    • MD5

      89070447b67e5906a567c61c88024e9c

    • SHA1

      1953e631b3b7cc106d2c34dfe5d4bc95d0c458e5

    • SHA256

      976ef2ef359ebd6fff5e206f9586d17bab0ee5e4d1bfe9334cc33a3986365f4a

    • SHA512

      2b2c3d5306e10ea7e93e6aeaa0240d4fca5d91aa5186b49e1a7493b58efa90373f072762ab12c395b86d6153cee070e9e1f3948702a12357f983e7228ddf28a8

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks