General
-
Target
7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1
-
Size
724KB
-
Sample
220731-fv9hrshhd3
-
MD5
122e0e9fc5119d3e9f075f36b594c70c
-
SHA1
79849b0335bd1a85fd91c4e81422ee0376ab89b3
-
SHA256
7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1
-
SHA512
f2925dbb618a0ad33f5d5f376e76079cee6c1772ea8b29c82f6f6d203f2600ea1badcf0136291e8dd8aee34189adb20668b4faf999408351bfb91ad91ffbb5a4
Behavioral task
behavioral1
Sample
7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1.exe
Resource
win7-20220718-en
Malware Config
Extracted
kutaki
http://maregatu.club/paapoo/pove.php
http://terebinnahi.club/sec/kool.txt
Targets
-
-
Target
7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1
-
Size
724KB
-
MD5
122e0e9fc5119d3e9f075f36b594c70c
-
SHA1
79849b0335bd1a85fd91c4e81422ee0376ab89b3
-
SHA256
7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1
-
SHA512
f2925dbb618a0ad33f5d5f376e76079cee6c1772ea8b29c82f6f6d203f2600ea1badcf0136291e8dd8aee34189adb20668b4faf999408351bfb91ad91ffbb5a4
-
Kutaki Executable
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-