General
-
Target
998388008566177928bfbd0f18e36df434f262dc316726dff764e9b21045881b
-
Size
1.0MB
-
Sample
220725-elkbvadgg7
-
MD5
7d9d24216b329d14d4dd428a23070f29
-
SHA1
636d97af3f64ad9efe07c5b820e7afddbbf89f74
-
SHA256
998388008566177928bfbd0f18e36df434f262dc316726dff764e9b21045881b
-
SHA512
4af9920e7a8d73457702c6ab7b27eb20bd42d4ccc18d8e5c2014e319584894f263d613a72d3de3a44a811a60dfa1bbb10371bc3ffce28d2ac22978fc23f06e53
Behavioral task
behavioral1
Sample
998388008566177928bfbd0f18e36df434f262dc316726dff764e9b21045881b.exe
Resource
win7-20220715-en
Malware Config
Targets
-
-
Target
998388008566177928bfbd0f18e36df434f262dc316726dff764e9b21045881b
-
Size
1.0MB
-
MD5
7d9d24216b329d14d4dd428a23070f29
-
SHA1
636d97af3f64ad9efe07c5b820e7afddbbf89f74
-
SHA256
998388008566177928bfbd0f18e36df434f262dc316726dff764e9b21045881b
-
SHA512
4af9920e7a8d73457702c6ab7b27eb20bd42d4ccc18d8e5c2014e319584894f263d613a72d3de3a44a811a60dfa1bbb10371bc3ffce28d2ac22978fc23f06e53
-
Kutaki Executable
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-