General

  • Target

    37d09b414bcdb52bd41321de0c8003f713537bf79e25636433cd553bbc0c5bbe

  • Size

    707KB

  • Sample

    220625-1y1p9afhc5

  • MD5

    eb31bd6d5ff7c28b47395961db00d4bd

  • SHA1

    2a41952d03da49c16095cc5aca603cd3bb8a2972

  • SHA256

    37d09b414bcdb52bd41321de0c8003f713537bf79e25636433cd553bbc0c5bbe

  • SHA512

    c38436a2588d43af05dae56cd1933f4fab83431d910267926640ba58a3892448ad908a5be7947d9b3c7ce5d60c5e2a170a744d41e608ad3e2dfc064514ceb137

Malware Config

Targets

    • Target

      37d09b414bcdb52bd41321de0c8003f713537bf79e25636433cd553bbc0c5bbe

    • Size

      707KB

    • MD5

      eb31bd6d5ff7c28b47395961db00d4bd

    • SHA1

      2a41952d03da49c16095cc5aca603cd3bb8a2972

    • SHA256

      37d09b414bcdb52bd41321de0c8003f713537bf79e25636433cd553bbc0c5bbe

    • SHA512

      c38436a2588d43af05dae56cd1933f4fab83431d910267926640ba58a3892448ad908a5be7947d9b3c7ce5d60c5e2a170a744d41e608ad3e2dfc064514ceb137

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks