General

  • Target

    73a3c2d670bc63cd77c0ccbfd6fc92972531897317c630f26f02ad58dbbf0af3

  • Size

    671KB

  • Sample

    220523-3rsr6shhb9

  • MD5

    62aea7e47f647f9d6d2cdacb15e4b163

  • SHA1

    884550e92ac4ad9c24f3473d889b9247775f5ee5

  • SHA256

    73a3c2d670bc63cd77c0ccbfd6fc92972531897317c630f26f02ad58dbbf0af3

  • SHA512

    59cdbc399225f2bf6fb3f56cfaa4c3705a0a5f23ae7d59ccf14467c19adc6ef5694fa91afae80ebeedd44ac3974923b6d8c616d87cc55a0d2fd8e2310108c283

Malware Config

Targets

    • Target

      73a3c2d670bc63cd77c0ccbfd6fc92972531897317c630f26f02ad58dbbf0af3

    • Size

      671KB

    • MD5

      62aea7e47f647f9d6d2cdacb15e4b163

    • SHA1

      884550e92ac4ad9c24f3473d889b9247775f5ee5

    • SHA256

      73a3c2d670bc63cd77c0ccbfd6fc92972531897317c630f26f02ad58dbbf0af3

    • SHA512

      59cdbc399225f2bf6fb3f56cfaa4c3705a0a5f23ae7d59ccf14467c19adc6ef5694fa91afae80ebeedd44ac3974923b6d8c616d87cc55a0d2fd8e2310108c283

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks