General

  • Target

    2f6131a0a3ffe5a26c75eccadeedafd20fd2b252cc21ba9ef7445c21b4d47efd

  • Size

    600KB

  • Sample

    220621-zs4dhsdbfk

  • MD5

    e20264435aec9a9c68a91dd6b3a9fd80

  • SHA1

    96ba4fa0a8c136975b67875fe3c1fa1012a41513

  • SHA256

    2f6131a0a3ffe5a26c75eccadeedafd20fd2b252cc21ba9ef7445c21b4d47efd

  • SHA512

    291978910b3ca2c91040bf76a3718fceb5647a2e678b323672c725f7d6a9028325204cc42d2c2788f0919821bfd924f508a2b90531b9932d6969ddb84c3ea4af

Malware Config

Targets

    • Target

      2f6131a0a3ffe5a26c75eccadeedafd20fd2b252cc21ba9ef7445c21b4d47efd

    • Size

      600KB

    • MD5

      e20264435aec9a9c68a91dd6b3a9fd80

    • SHA1

      96ba4fa0a8c136975b67875fe3c1fa1012a41513

    • SHA256

      2f6131a0a3ffe5a26c75eccadeedafd20fd2b252cc21ba9ef7445c21b4d47efd

    • SHA512

      291978910b3ca2c91040bf76a3718fceb5647a2e678b323672c725f7d6a9028325204cc42d2c2788f0919821bfd924f508a2b90531b9932d6969ddb84c3ea4af

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks