General
-
Target
f0719030fe6c57b80d5aa3716e8a878de08112f116e230afc10bfca73a29f2bc
-
Size
499KB
-
Sample
220724-shpn2sgdej
-
MD5
3d286767965d3960576a64e772175d6c
-
SHA1
b2fdeb9a1af6ea401c8388b1198a729caf01b4ce
-
SHA256
f0719030fe6c57b80d5aa3716e8a878de08112f116e230afc10bfca73a29f2bc
-
SHA512
217dd95656d7c0e76cda0e25f82857f16e2224b7d13e1fb050083a169450e403699ef65464b7de841820972b1c04a0055780c95e46932d9d24134e997b115ed8
Behavioral task
behavioral1
Sample
f0719030fe6c57b80d5aa3716e8a878de08112f116e230afc10bfca73a29f2bc.exe
Resource
win7-20220715-en
Malware Config
Targets
-
-
Target
f0719030fe6c57b80d5aa3716e8a878de08112f116e230afc10bfca73a29f2bc
-
Size
499KB
-
MD5
3d286767965d3960576a64e772175d6c
-
SHA1
b2fdeb9a1af6ea401c8388b1198a729caf01b4ce
-
SHA256
f0719030fe6c57b80d5aa3716e8a878de08112f116e230afc10bfca73a29f2bc
-
SHA512
217dd95656d7c0e76cda0e25f82857f16e2224b7d13e1fb050083a169450e403699ef65464b7de841820972b1c04a0055780c95e46932d9d24134e997b115ed8
-
Kutaki Executable
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-