General

  • Target

    4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e

  • Size

    560KB

  • Sample

    220527-3nv35adbcq

  • MD5

    f85699f0c3bca198228a5af7de67ecba

  • SHA1

    56f4a24a398dae4e6e47d62832144673b3486f9f

  • SHA256

    4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e

  • SHA512

    b170c937b015ae6a2ae98ae609f2c6626130681b95d45089d99d9bed9b8fffc54b170b1f69d0d2b64acbf8d3282e08e45b5accbdbbc753dbaa13d6ff510e3582

Malware Config

Targets

    • Target

      4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e

    • Size

      560KB

    • MD5

      f85699f0c3bca198228a5af7de67ecba

    • SHA1

      56f4a24a398dae4e6e47d62832144673b3486f9f

    • SHA256

      4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e

    • SHA512

      b170c937b015ae6a2ae98ae609f2c6626130681b95d45089d99d9bed9b8fffc54b170b1f69d0d2b64acbf8d3282e08e45b5accbdbbc753dbaa13d6ff510e3582

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks