General

  • Target

    d510b26ecf363b3ff1889ae6057482bbba5254cf7440ed42efaa37fa3aa8cf69

  • Size

    3.1MB

  • Sample

    220908-ejbxpaafhk

  • MD5

    79e5e9c2a96ad4bf443565f151afd809

  • SHA1

    a6a692f7e9733f823d9659e6bae87c096f0f1170

  • SHA256

    d510b26ecf363b3ff1889ae6057482bbba5254cf7440ed42efaa37fa3aa8cf69

  • SHA512

    7d0f385dc4a480fe366461fd0221b7c792d41a35fea5b9586c083f5cf9f42a5a2a916c60bf71f82ce32b899c61626f761f51bfe904b9e8fee68d7605af8b4019

  • SSDEEP

    12288:C1dAHWyU4QtcQSsdgHy46A9jmP/uhu/yMS08CkntxYRh:A1rtqfJfmP/UDMS08Ckn3g

Malware Config

Extracted

Family

kutaki

C2

http://ojorobia.club/laptop/laptop.php

http://terebinnahicc.club/sec/kool.txt

Targets

    • Target

      d510b26ecf363b3ff1889ae6057482bbba5254cf7440ed42efaa37fa3aa8cf69

    • Size

      3.1MB

    • MD5

      79e5e9c2a96ad4bf443565f151afd809

    • SHA1

      a6a692f7e9733f823d9659e6bae87c096f0f1170

    • SHA256

      d510b26ecf363b3ff1889ae6057482bbba5254cf7440ed42efaa37fa3aa8cf69

    • SHA512

      7d0f385dc4a480fe366461fd0221b7c792d41a35fea5b9586c083f5cf9f42a5a2a916c60bf71f82ce32b899c61626f761f51bfe904b9e8fee68d7605af8b4019

    • SSDEEP

      12288:C1dAHWyU4QtcQSsdgHy46A9jmP/uhu/yMS08CkntxYRh:A1rtqfJfmP/UDMS08Ckn3g

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks