General
-
Target
232f10262a60fab461cd17fe1608f7f8d117e342e2ba7e84a74831660e9e1519
-
Size
792KB
-
Sample
220612-cxj44saddp
-
MD5
220f10689d9557f2af16ba186cdd23af
-
SHA1
ae75eea3a324d9e7842b78b53a4457546e8cb611
-
SHA256
232f10262a60fab461cd17fe1608f7f8d117e342e2ba7e84a74831660e9e1519
-
SHA512
524e011c69d833803983b295ebba7aeada82cbb2ab19aa6c3158da0df13b511f0e22afeea8f964b80666bf288b6a51f9aae6949e63a64d5ee1e4af05af0f3518
Static task
static1
Behavioral task
behavioral1
Sample
232f10262a60fab461cd17fe1608f7f8d117e342e2ba7e84a74831660e9e1519.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
232f10262a60fab461cd17fe1608f7f8d117e342e2ba7e84a74831660e9e1519
-
Size
792KB
-
MD5
220f10689d9557f2af16ba186cdd23af
-
SHA1
ae75eea3a324d9e7842b78b53a4457546e8cb611
-
SHA256
232f10262a60fab461cd17fe1608f7f8d117e342e2ba7e84a74831660e9e1519
-
SHA512
524e011c69d833803983b295ebba7aeada82cbb2ab19aa6c3158da0df13b511f0e22afeea8f964b80666bf288b6a51f9aae6949e63a64d5ee1e4af05af0f3518
-
Kutaki Executable
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-