General

  • Target

    3e6593faa630ec2c87ff8406f08264bb055982363400fddeaca502b0019ce6fd

  • Size

    568KB

  • Sample

    220701-jd1q3sabal

  • MD5

    609b31697442f224deb7fcd4170e8fd3

  • SHA1

    11aed89fd1a0141fcc4626c1411239e5afe6ee8c

  • SHA256

    3e6593faa630ec2c87ff8406f08264bb055982363400fddeaca502b0019ce6fd

  • SHA512

    aeb9d03cc8feab950ddb36ffab3e68a2eab9fd31ab4da01236ee8e539d4078ac92d28ef7245a346a331324cd3aea20f3f18322f8371153ca93ac4b5c94aa724c

Malware Config

Targets

    • Target

      3e6593faa630ec2c87ff8406f08264bb055982363400fddeaca502b0019ce6fd

    • Size

      568KB

    • MD5

      609b31697442f224deb7fcd4170e8fd3

    • SHA1

      11aed89fd1a0141fcc4626c1411239e5afe6ee8c

    • SHA256

      3e6593faa630ec2c87ff8406f08264bb055982363400fddeaca502b0019ce6fd

    • SHA512

      aeb9d03cc8feab950ddb36ffab3e68a2eab9fd31ab4da01236ee8e539d4078ac92d28ef7245a346a331324cd3aea20f3f18322f8371153ca93ac4b5c94aa724c

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks