General

  • Target

    62e4ce478f0bc615d11257a09a9ed68ae42c2ada0e4c62c548f1245befa04462

  • Size

    1.1MB

  • Sample

    220603-sfl55seefn

  • MD5

    bdfe1051fc246f74193f5e5c8749b7ec

  • SHA1

    78a61790dccb94853e233ec1f75db3ee6055b5de

  • SHA256

    62e4ce478f0bc615d11257a09a9ed68ae42c2ada0e4c62c548f1245befa04462

  • SHA512

    e1d1c9ce40de4e922f0a5c1bad4f565251fc3bc6d9e763b1d027f9a00edee9589c094a0586e9d87a49c3f6812e2ca4e6d7777f171502583dcc215900fc851de7

Malware Config

Targets

    • Target

      62e4ce478f0bc615d11257a09a9ed68ae42c2ada0e4c62c548f1245befa04462

    • Size

      1.1MB

    • MD5

      bdfe1051fc246f74193f5e5c8749b7ec

    • SHA1

      78a61790dccb94853e233ec1f75db3ee6055b5de

    • SHA256

      62e4ce478f0bc615d11257a09a9ed68ae42c2ada0e4c62c548f1245befa04462

    • SHA512

      e1d1c9ce40de4e922f0a5c1bad4f565251fc3bc6d9e763b1d027f9a00edee9589c094a0586e9d87a49c3f6812e2ca4e6d7777f171502583dcc215900fc851de7

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks