Static task
static1
Behavioral task
behavioral1
Sample
universal_neft_report.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
universal_neft_report.exe
Resource
win10v2004-20220414-en
General
-
Target
universal_neft_report.bat
-
Size
972KB
-
MD5
144d83852e738392e0454371b29a4324
-
SHA1
31d132f67cbe436f92fa9f4c3b10281e6f43abe4
-
SHA256
f9958817f757a8a43eef5eeafc7ac8e55e592cbf5a05e2c7d246586e6b5501c6
-
SHA512
cc697f852c6bb17b1d218cca451cba5d12266c449dcce5fb5544661b319e34caa319b65603c59c8216abac47e1cccc22dd44a20552f318bebf2704fd3b70f93d
-
SSDEEP
24576:se46D5tKERWpnhNjQlUPnGYI5aDMI4fmP/UDMS08Ckn3M:r46lgEshNjQmuYMaoI4fmP/SA8N8
Malware Config
Signatures
-
Kutaki Executable 1 IoCs
resource yara_rule sample family_kutaki -
Kutaki family
Files
-
universal_neft_report.bat.exe windows x86
67f310695ece8f1856c07ea3008696c1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord690
ord696
ord698
MethCallEngine
ord516
ord518
ord626
ord519
ord667
ord591
ord593
ord594
ord595
ord596
ord598
ord520
ord631
ord632
ord525
ord526
EVENT_SINK_AddRef
ord528
ord529
ord561
DllFunctionCall
ord563
ord670
ord564
EVENT_SINK_Release
ord600
ord601
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord713
ord714
ord607
ord608
ord716
ord717
ProcCallEngine
ord644
ord537
ord645
ord648
ord570
ord573
ord681
ord576
ord685
ord100
ord689
ord616
ord617
ord618
ord619
ord581
Sections
.text Size: 704KB - Virtual size: 700KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 264KB - Virtual size: 262KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ