General

  • Target

    ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb

  • Size

    496KB

  • Sample

    220609-kxy72aeadj

  • MD5

    9ca01142589187736ef32d73d28973e0

  • SHA1

    307faa96f8186c56e8f670860190e08129d43b5b

  • SHA256

    ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb

  • SHA512

    9ad4906cd5ac83dbcbbe2bf875eb196ddc82d423ddc58c92feb44039d1f0620bfc26ba330eb4afd31d3a14d8094fb21ba30beb6ceba8f5980cf82e59252332de

Malware Config

Targets

    • Target

      ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb

    • Size

      496KB

    • MD5

      9ca01142589187736ef32d73d28973e0

    • SHA1

      307faa96f8186c56e8f670860190e08129d43b5b

    • SHA256

      ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb

    • SHA512

      9ad4906cd5ac83dbcbbe2bf875eb196ddc82d423ddc58c92feb44039d1f0620bfc26ba330eb4afd31d3a14d8094fb21ba30beb6ceba8f5980cf82e59252332de

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks