General
-
Target
b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf
-
Size
636KB
-
Sample
220724-y6vsvsfdgj
-
MD5
d31babbee891b978c01df4bc1598b453
-
SHA1
973ec9c69c496bc7984388f7541e8f5f34d1721d
-
SHA256
b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf
-
SHA512
028ba6e00e41594e6d77ec6ecc216378cf59b5a33a936b9237b7f4ac8ab8fd265bf5f3914e61ad1bcb9927b204c51b706140d451fb4910992b3d4694331980b3
Behavioral task
behavioral1
Sample
b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe
Resource
win7-20220718-en
Malware Config
Extracted
kutaki
http://maregatu.club/paapoo/pove.php
http://terebinnahi.club/sec/kool.txt
Targets
-
-
Target
b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf
-
Size
636KB
-
MD5
d31babbee891b978c01df4bc1598b453
-
SHA1
973ec9c69c496bc7984388f7541e8f5f34d1721d
-
SHA256
b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf
-
SHA512
028ba6e00e41594e6d77ec6ecc216378cf59b5a33a936b9237b7f4ac8ab8fd265bf5f3914e61ad1bcb9927b204c51b706140d451fb4910992b3d4694331980b3
-
Kutaki Executable
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-