General

  • Target

    b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf

  • Size

    636KB

  • Sample

    220724-y6vsvsfdgj

  • MD5

    d31babbee891b978c01df4bc1598b453

  • SHA1

    973ec9c69c496bc7984388f7541e8f5f34d1721d

  • SHA256

    b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf

  • SHA512

    028ba6e00e41594e6d77ec6ecc216378cf59b5a33a936b9237b7f4ac8ab8fd265bf5f3914e61ad1bcb9927b204c51b706140d451fb4910992b3d4694331980b3

Malware Config

Extracted

Family

kutaki

C2

http://maregatu.club/paapoo/pove.php

http://terebinnahi.club/sec/kool.txt

Targets

    • Target

      b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf

    • Size

      636KB

    • MD5

      d31babbee891b978c01df4bc1598b453

    • SHA1

      973ec9c69c496bc7984388f7541e8f5f34d1721d

    • SHA256

      b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf

    • SHA512

      028ba6e00e41594e6d77ec6ecc216378cf59b5a33a936b9237b7f4ac8ab8fd265bf5f3914e61ad1bcb9927b204c51b706140d451fb4910992b3d4694331980b3

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks