General
-
Target
35a124707d778d78543bf3bce873defdad0934144368a9c627bfea3583afbd9a
-
Size
472KB
-
Sample
220626-3kqz1aehaq
-
MD5
62dd3acc62df21dd48cb8a50222b5603
-
SHA1
27f9ca1e1537d58daa899a0ddd44b1f216d80384
-
SHA256
35a124707d778d78543bf3bce873defdad0934144368a9c627bfea3583afbd9a
-
SHA512
9f3404f25c18af16f65183faf393ce9809db41f19a3705a54abcbc79cd604cd101ec344c3715279ecfd1b3d9890263ff0fc65710644d7aded81070345d06c627
Static task
static1
Behavioral task
behavioral1
Sample
35a124707d778d78543bf3bce873defdad0934144368a9c627bfea3583afbd9a.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
35a124707d778d78543bf3bce873defdad0934144368a9c627bfea3583afbd9a
-
Size
472KB
-
MD5
62dd3acc62df21dd48cb8a50222b5603
-
SHA1
27f9ca1e1537d58daa899a0ddd44b1f216d80384
-
SHA256
35a124707d778d78543bf3bce873defdad0934144368a9c627bfea3583afbd9a
-
SHA512
9f3404f25c18af16f65183faf393ce9809db41f19a3705a54abcbc79cd604cd101ec344c3715279ecfd1b3d9890263ff0fc65710644d7aded81070345d06c627
-
Kutaki Executable
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-