General

  • Target

    032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e

  • Size

    560KB

  • Sample

    220528-brrfkabgg8

  • MD5

    5f27bb40eb33d56669235b43214ed7b9

  • SHA1

    9b9326e6771a1e5130c47664a984a8112ebf826c

  • SHA256

    032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e

  • SHA512

    ae49f24963e3b8dc093f6db313658659bbb73c805c91f0a271126b41146c19c3fe94be705c30614d9e996e55ba874536fe70badccc8a11aa04af9ee65b982d9f

Malware Config

Targets

    • Target

      032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e

    • Size

      560KB

    • MD5

      5f27bb40eb33d56669235b43214ed7b9

    • SHA1

      9b9326e6771a1e5130c47664a984a8112ebf826c

    • SHA256

      032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e

    • SHA512

      ae49f24963e3b8dc093f6db313658659bbb73c805c91f0a271126b41146c19c3fe94be705c30614d9e996e55ba874536fe70badccc8a11aa04af9ee65b982d9f

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks