General
-
Target
4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e
-
Size
560KB
-
Sample
220527-3nv35adbcq
-
MD5
f85699f0c3bca198228a5af7de67ecba
-
SHA1
56f4a24a398dae4e6e47d62832144673b3486f9f
-
SHA256
4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e
-
SHA512
b170c937b015ae6a2ae98ae609f2c6626130681b95d45089d99d9bed9b8fffc54b170b1f69d0d2b64acbf8d3282e08e45b5accbdbbc753dbaa13d6ff510e3582
Static task
static1
Behavioral task
behavioral1
Sample
4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e
-
Size
560KB
-
MD5
f85699f0c3bca198228a5af7de67ecba
-
SHA1
56f4a24a398dae4e6e47d62832144673b3486f9f
-
SHA256
4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e
-
SHA512
b170c937b015ae6a2ae98ae609f2c6626130681b95d45089d99d9bed9b8fffc54b170b1f69d0d2b64acbf8d3282e08e45b5accbdbbc753dbaa13d6ff510e3582
-
Kutaki Executable
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-