General

  • Target

    35a124707d778d78543bf3bce873defdad0934144368a9c627bfea3583afbd9a

  • Size

    472KB

  • Sample

    220626-3kqz1aehaq

  • MD5

    62dd3acc62df21dd48cb8a50222b5603

  • SHA1

    27f9ca1e1537d58daa899a0ddd44b1f216d80384

  • SHA256

    35a124707d778d78543bf3bce873defdad0934144368a9c627bfea3583afbd9a

  • SHA512

    9f3404f25c18af16f65183faf393ce9809db41f19a3705a54abcbc79cd604cd101ec344c3715279ecfd1b3d9890263ff0fc65710644d7aded81070345d06c627

Malware Config

Targets

    • Target

      35a124707d778d78543bf3bce873defdad0934144368a9c627bfea3583afbd9a

    • Size

      472KB

    • MD5

      62dd3acc62df21dd48cb8a50222b5603

    • SHA1

      27f9ca1e1537d58daa899a0ddd44b1f216d80384

    • SHA256

      35a124707d778d78543bf3bce873defdad0934144368a9c627bfea3583afbd9a

    • SHA512

      9f3404f25c18af16f65183faf393ce9809db41f19a3705a54abcbc79cd604cd101ec344c3715279ecfd1b3d9890263ff0fc65710644d7aded81070345d06c627

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks