General
-
Target
5656c83c7d8cf3e80122d9bf2417f4c6089f14f8db2d12f9c64f7293784b1d59
-
Size
400KB
-
Sample
220725-elk85seadn
-
MD5
5b78c6c09f6cbe05538b1ebb2b741616
-
SHA1
6b7ee6ad7ba3e6013d988368b417f935e4571354
-
SHA256
5656c83c7d8cf3e80122d9bf2417f4c6089f14f8db2d12f9c64f7293784b1d59
-
SHA512
58a509866cbd11f195f77a498d57cee85acf461f9a3e6e41c99def8af43dcfb5ccae56502e1774fb72424d406f025818f4fa20625e4424787043a556280a5ccf
Behavioral task
behavioral1
Sample
Tax Payment Challan.exe
Resource
win7-20220718-en
Malware Config
Targets
-
-
Target
Tax Payment Challan.exe
-
Size
1.0MB
-
MD5
7d9d24216b329d14d4dd428a23070f29
-
SHA1
636d97af3f64ad9efe07c5b820e7afddbbf89f74
-
SHA256
998388008566177928bfbd0f18e36df434f262dc316726dff764e9b21045881b
-
SHA512
4af9920e7a8d73457702c6ab7b27eb20bd42d4ccc18d8e5c2014e319584894f263d613a72d3de3a44a811a60dfa1bbb10371bc3ffce28d2ac22978fc23f06e53
-
Kutaki Executable
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-