General

  • Target

    614b1804f29b1fd1aaaf62dd34c9a731bd43d68f47407e0ca2aec09a246e4101

  • Size

    334KB

  • Sample

    220521-bky7tscac7

  • MD5

    78e809c55f5df7c849de4218d153ad21

  • SHA1

    9a27a8aec0162402b57b8fb4cafbd73865bb006f

  • SHA256

    614b1804f29b1fd1aaaf62dd34c9a731bd43d68f47407e0ca2aec09a246e4101

  • SHA512

    846f9857b81236c0a3e4392f6b7919173424ff432f4ca9a5bc8896dee08671d277e40d95cf561a7f1235faea2365fc976385f7b3d0169fbd8f52f950c48790c7

Malware Config

Targets

    • Target

      image.exe

    • Size

      504KB

    • MD5

      8386b787dfff37c3e7bcdcc03a0a7487

    • SHA1

      c20d9e818f912fc4f47ed1e85718c6196b911801

    • SHA256

      25f0420d3551985569fb57497301c7d2f691083d7318d28db5bab2e8a6a0bb85

    • SHA512

      aace70e1d3bd221fffdcfe8649df4e47807b5f2679032866acf31b41814623eab85b6930bb9e79c11d4f48edfb5670d9d9a98941106c06c67cd9bd22f5c64bd0

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks