General

  • Target

    80914b82ff7fedd60a003009fe4e85a1f3f27b66f8c6be3c575f93ba54cb036d

  • Size

    472KB

  • Sample

    220724-shf2xagce2

  • MD5

    99e9541ed3ea8e813d79e1158579cd33

  • SHA1

    0bb3144b8f639beb54dcf7800b7e0b46f7ed60b7

  • SHA256

    80914b82ff7fedd60a003009fe4e85a1f3f27b66f8c6be3c575f93ba54cb036d

  • SHA512

    948eb85658d3a2dd485d9340cd770147b28952583f353d8027ca69547b438cea44df2fead84d2cb3dada36bb14f3744132bcf172daa7e4dfeee6b059b8119e8b

Malware Config

Targets

    • Target

      80914b82ff7fedd60a003009fe4e85a1f3f27b66f8c6be3c575f93ba54cb036d

    • Size

      472KB

    • MD5

      99e9541ed3ea8e813d79e1158579cd33

    • SHA1

      0bb3144b8f639beb54dcf7800b7e0b46f7ed60b7

    • SHA256

      80914b82ff7fedd60a003009fe4e85a1f3f27b66f8c6be3c575f93ba54cb036d

    • SHA512

      948eb85658d3a2dd485d9340cd770147b28952583f353d8027ca69547b438cea44df2fead84d2cb3dada36bb14f3744132bcf172daa7e4dfeee6b059b8119e8b

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks