General
-
Target
37d09b414bcdb52bd41321de0c8003f713537bf79e25636433cd553bbc0c5bbe
-
Size
707KB
-
Sample
220625-1y1p9afhc5
-
MD5
eb31bd6d5ff7c28b47395961db00d4bd
-
SHA1
2a41952d03da49c16095cc5aca603cd3bb8a2972
-
SHA256
37d09b414bcdb52bd41321de0c8003f713537bf79e25636433cd553bbc0c5bbe
-
SHA512
c38436a2588d43af05dae56cd1933f4fab83431d910267926640ba58a3892448ad908a5be7947d9b3c7ce5d60c5e2a170a744d41e608ad3e2dfc064514ceb137
Static task
static1
Behavioral task
behavioral1
Sample
37d09b414bcdb52bd41321de0c8003f713537bf79e25636433cd553bbc0c5bbe.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
37d09b414bcdb52bd41321de0c8003f713537bf79e25636433cd553bbc0c5bbe
-
Size
707KB
-
MD5
eb31bd6d5ff7c28b47395961db00d4bd
-
SHA1
2a41952d03da49c16095cc5aca603cd3bb8a2972
-
SHA256
37d09b414bcdb52bd41321de0c8003f713537bf79e25636433cd553bbc0c5bbe
-
SHA512
c38436a2588d43af05dae56cd1933f4fab83431d910267926640ba58a3892448ad908a5be7947d9b3c7ce5d60c5e2a170a744d41e608ad3e2dfc064514ceb137
-
Kutaki Executable
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-