General
-
Target
032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e
-
Size
560KB
-
Sample
220528-brrfkabgg8
-
MD5
5f27bb40eb33d56669235b43214ed7b9
-
SHA1
9b9326e6771a1e5130c47664a984a8112ebf826c
-
SHA256
032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e
-
SHA512
ae49f24963e3b8dc093f6db313658659bbb73c805c91f0a271126b41146c19c3fe94be705c30614d9e996e55ba874536fe70badccc8a11aa04af9ee65b982d9f
Static task
static1
Behavioral task
behavioral1
Sample
032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e
-
Size
560KB
-
MD5
5f27bb40eb33d56669235b43214ed7b9
-
SHA1
9b9326e6771a1e5130c47664a984a8112ebf826c
-
SHA256
032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e
-
SHA512
ae49f24963e3b8dc093f6db313658659bbb73c805c91f0a271126b41146c19c3fe94be705c30614d9e996e55ba874536fe70badccc8a11aa04af9ee65b982d9f
-
Kutaki Executable
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-