General
-
Target
55dfd27d50e55d714888455ff76c5cbed787547df9e7f1bf7824d7e0994fdf6c
-
Size
795KB
-
Sample
220725-r3gy9sfaaq
-
MD5
feaa99287f22b1fad4acdfec4481daa3
-
SHA1
9e882b1037f36bb2ae131500954c16bc1f0aa26f
-
SHA256
55dfd27d50e55d714888455ff76c5cbed787547df9e7f1bf7824d7e0994fdf6c
-
SHA512
13ed01e3afef06b0596cd549ef814f6aece751f221b806828bde945bb9989979e1b1381875219cb23b8494f186f4120acfa64ddb1c577adf555f5260eb884366
Behavioral task
behavioral1
Sample
55dfd27d50e55d714888455ff76c5cbed787547df9e7f1bf7824d7e0994fdf6c.exe
Resource
win7-20220715-en
Malware Config
Targets
-
-
Target
55dfd27d50e55d714888455ff76c5cbed787547df9e7f1bf7824d7e0994fdf6c
-
Size
795KB
-
MD5
feaa99287f22b1fad4acdfec4481daa3
-
SHA1
9e882b1037f36bb2ae131500954c16bc1f0aa26f
-
SHA256
55dfd27d50e55d714888455ff76c5cbed787547df9e7f1bf7824d7e0994fdf6c
-
SHA512
13ed01e3afef06b0596cd549ef814f6aece751f221b806828bde945bb9989979e1b1381875219cb23b8494f186f4120acfa64ddb1c577adf555f5260eb884366
-
Kutaki Executable
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-