General

  • Target

    c6f03fe1e88eba449e3d525aebb408e4

  • Size

    1.1MB

  • MD5

    c6f03fe1e88eba449e3d525aebb408e4

  • SHA1

    50f47e17d73e28e1df44af1f869ddc23ddddd650

  • SHA256

    56a6bca7c19df8d148d6662a92c118035254d929df721f4112b7f59aece15866

  • SHA512

    03da1c30f923e7297ba551d12646031c6f19860bf2c27991923f92e35ab973addcc4c50a49574f3ce7a91378d7a4f35a0caecc6143d83141c4ff5fb6fd3f5225

  • SSDEEP

    24576:3BAyQdVzHYxgpy2V3PExY9UIkl1L6VJQpTmf/ijKS08Sknt/:3BmfHYxyy2VfExY9UIwL6VJgTmf/UK8j

Score
10/10

Malware Config

Extracted

Family

kutaki

C2

http://ojorobia.club/laptop/laptop.php

http://terebinnahicc.club/sec/kool.txt

Signatures

  • Kutaki Executable 1 IoCs
  • Kutaki family

Files

  • c6f03fe1e88eba449e3d525aebb408e4
    .zip
  • NEFT_Payment.exe
    .exe windows x86

    f8f6290cc4fe327af7b2895638dfcb79


    Headers

    Imports

    Sections