General

  • Target

    7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1

  • Size

    724KB

  • Sample

    220731-fv9hrshhd3

  • MD5

    122e0e9fc5119d3e9f075f36b594c70c

  • SHA1

    79849b0335bd1a85fd91c4e81422ee0376ab89b3

  • SHA256

    7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1

  • SHA512

    f2925dbb618a0ad33f5d5f376e76079cee6c1772ea8b29c82f6f6d203f2600ea1badcf0136291e8dd8aee34189adb20668b4faf999408351bfb91ad91ffbb5a4

Malware Config

Extracted

Family

kutaki

C2

http://maregatu.club/paapoo/pove.php

http://terebinnahi.club/sec/kool.txt

Targets

    • Target

      7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1

    • Size

      724KB

    • MD5

      122e0e9fc5119d3e9f075f36b594c70c

    • SHA1

      79849b0335bd1a85fd91c4e81422ee0376ab89b3

    • SHA256

      7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1

    • SHA512

      f2925dbb618a0ad33f5d5f376e76079cee6c1772ea8b29c82f6f6d203f2600ea1badcf0136291e8dd8aee34189adb20668b4faf999408351bfb91ad91ffbb5a4

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks