General

  • Target

    55dfd27d50e55d714888455ff76c5cbed787547df9e7f1bf7824d7e0994fdf6c

  • Size

    795KB

  • Sample

    220725-r3gy9sfaaq

  • MD5

    feaa99287f22b1fad4acdfec4481daa3

  • SHA1

    9e882b1037f36bb2ae131500954c16bc1f0aa26f

  • SHA256

    55dfd27d50e55d714888455ff76c5cbed787547df9e7f1bf7824d7e0994fdf6c

  • SHA512

    13ed01e3afef06b0596cd549ef814f6aece751f221b806828bde945bb9989979e1b1381875219cb23b8494f186f4120acfa64ddb1c577adf555f5260eb884366

Malware Config

Targets

    • Target

      55dfd27d50e55d714888455ff76c5cbed787547df9e7f1bf7824d7e0994fdf6c

    • Size

      795KB

    • MD5

      feaa99287f22b1fad4acdfec4481daa3

    • SHA1

      9e882b1037f36bb2ae131500954c16bc1f0aa26f

    • SHA256

      55dfd27d50e55d714888455ff76c5cbed787547df9e7f1bf7824d7e0994fdf6c

    • SHA512

      13ed01e3afef06b0596cd549ef814f6aece751f221b806828bde945bb9989979e1b1381875219cb23b8494f186f4120acfa64ddb1c577adf555f5260eb884366

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks