General

  • Target

    232f10262a60fab461cd17fe1608f7f8d117e342e2ba7e84a74831660e9e1519

  • Size

    792KB

  • Sample

    220612-cxj44saddp

  • MD5

    220f10689d9557f2af16ba186cdd23af

  • SHA1

    ae75eea3a324d9e7842b78b53a4457546e8cb611

  • SHA256

    232f10262a60fab461cd17fe1608f7f8d117e342e2ba7e84a74831660e9e1519

  • SHA512

    524e011c69d833803983b295ebba7aeada82cbb2ab19aa6c3158da0df13b511f0e22afeea8f964b80666bf288b6a51f9aae6949e63a64d5ee1e4af05af0f3518

Malware Config

Targets

    • Target

      232f10262a60fab461cd17fe1608f7f8d117e342e2ba7e84a74831660e9e1519

    • Size

      792KB

    • MD5

      220f10689d9557f2af16ba186cdd23af

    • SHA1

      ae75eea3a324d9e7842b78b53a4457546e8cb611

    • SHA256

      232f10262a60fab461cd17fe1608f7f8d117e342e2ba7e84a74831660e9e1519

    • SHA512

      524e011c69d833803983b295ebba7aeada82cbb2ab19aa6c3158da0df13b511f0e22afeea8f964b80666bf288b6a51f9aae6949e63a64d5ee1e4af05af0f3518

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks