General

  • Target

    bd83761e9710a92a9b0b60a85c87f5aa2a27d30a8cff821e65df95d323d5b3d4

  • Size

    795KB

  • Sample

    220726-xbazjagag4

  • MD5

    17c53a651b72616b46ecb8f5215ed009

  • SHA1

    c426cc3a5e333bafb8e0b0ed78515dc003da31c6

  • SHA256

    bd83761e9710a92a9b0b60a85c87f5aa2a27d30a8cff821e65df95d323d5b3d4

  • SHA512

    c2abab756d7351f819340857d1f500e7344838d28f744de6db39d5e3021b4382be3920b77985f057404f6b6206f09010f2bd0b2fcb61a944276145acf375c5c6

Malware Config

Targets

    • Target

      bd83761e9710a92a9b0b60a85c87f5aa2a27d30a8cff821e65df95d323d5b3d4

    • Size

      795KB

    • MD5

      17c53a651b72616b46ecb8f5215ed009

    • SHA1

      c426cc3a5e333bafb8e0b0ed78515dc003da31c6

    • SHA256

      bd83761e9710a92a9b0b60a85c87f5aa2a27d30a8cff821e65df95d323d5b3d4

    • SHA512

      c2abab756d7351f819340857d1f500e7344838d28f744de6db39d5e3021b4382be3920b77985f057404f6b6206f09010f2bd0b2fcb61a944276145acf375c5c6

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks