General
-
Target
2f6131a0a3ffe5a26c75eccadeedafd20fd2b252cc21ba9ef7445c21b4d47efd
-
Size
600KB
-
Sample
220621-zs4dhsdbfk
-
MD5
e20264435aec9a9c68a91dd6b3a9fd80
-
SHA1
96ba4fa0a8c136975b67875fe3c1fa1012a41513
-
SHA256
2f6131a0a3ffe5a26c75eccadeedafd20fd2b252cc21ba9ef7445c21b4d47efd
-
SHA512
291978910b3ca2c91040bf76a3718fceb5647a2e678b323672c725f7d6a9028325204cc42d2c2788f0919821bfd924f508a2b90531b9932d6969ddb84c3ea4af
Static task
static1
Behavioral task
behavioral1
Sample
2f6131a0a3ffe5a26c75eccadeedafd20fd2b252cc21ba9ef7445c21b4d47efd.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
2f6131a0a3ffe5a26c75eccadeedafd20fd2b252cc21ba9ef7445c21b4d47efd
-
Size
600KB
-
MD5
e20264435aec9a9c68a91dd6b3a9fd80
-
SHA1
96ba4fa0a8c136975b67875fe3c1fa1012a41513
-
SHA256
2f6131a0a3ffe5a26c75eccadeedafd20fd2b252cc21ba9ef7445c21b4d47efd
-
SHA512
291978910b3ca2c91040bf76a3718fceb5647a2e678b323672c725f7d6a9028325204cc42d2c2788f0919821bfd924f508a2b90531b9932d6969ddb84c3ea4af
-
Kutaki Executable
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-