General

  • Target

    RTGS_Payment.zip

  • Size

    328KB

  • Sample

    220711-jp628sfccj

  • MD5

    1d0ae9996cead47fb88bfff3c6ad1e16

  • SHA1

    234ec1f3e2fa4e618bcaabbc3f01c13f20436bdd

  • SHA256

    b5d3d965444fd3e7a0df7821d7ac2343dd3e4feb9fcd12e2be0910cee2b51850

  • SHA512

    4e38e06a3c1a0b1c929f8acadea4e86a5a84cc32e86f26daf02c9f320f7c10485ff8c2910dc31d0d82c9c0b7f9b89b1efe33e79c16c5362d879c562a104ce371

Malware Config

Targets

    • Target

      RTGS_Payment.exe

    • Size

      968KB

    • MD5

      a6e5804f4d6a9a2a823a70ad37db3716

    • SHA1

      f20ce20488fb607162285b0ccac95bc965bf116d

    • SHA256

      5f7e2c3aca868d28e2321913fee896d84b6e648e9289c2dacecd5bf85f7ee743

    • SHA512

      cdea1a027cb63173035c4d0d681ad1bd0c63bb2f0a722d6d5316aaae9e474b2e9d0b21cf7f74388ff348133deab4aab92f431d125db79e8134b98d93c26ba4be

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks