General

  • Target

    HDFC Tax Payment Attached.exe

  • Size

    408KB

  • Sample

    220909-hysqjagff6

  • MD5

    f2d9b19707c3356037cb197852fe938d

  • SHA1

    44e2604986ee12516c7a53226885eb062e70fb19

  • SHA256

    793b8eebc54d69cd4e7e80400d55bc97dda0ff3836c39eec8c67a00285bdd722

  • SHA512

    1a9de6ca3b77396792dc3914dcef44f00dec10ed2d51bcb7721c61756a290260523017de20a257a1e09969155208471967f5e2bd4ef34940b71d2f1e87709db0

  • SSDEEP

    6144:Bx9Xwhm7c/n10V7c5W4Es+CS/wUcvzUjSa5pK2mKdl0TruunfD09gfJChgGJhCj:BbXwhm7a1NB4/8vYjDpK8atfx8hDu

Malware Config

Extracted

Family

kutaki

C2

http://newbosslink.xyz/baba/new4.php

Targets

    • Target

      HDFC Tax Payment Attached.exe

    • Size

      408KB

    • MD5

      f2d9b19707c3356037cb197852fe938d

    • SHA1

      44e2604986ee12516c7a53226885eb062e70fb19

    • SHA256

      793b8eebc54d69cd4e7e80400d55bc97dda0ff3836c39eec8c67a00285bdd722

    • SHA512

      1a9de6ca3b77396792dc3914dcef44f00dec10ed2d51bcb7721c61756a290260523017de20a257a1e09969155208471967f5e2bd4ef34940b71d2f1e87709db0

    • SSDEEP

      6144:Bx9Xwhm7c/n10V7c5W4Es+CS/wUcvzUjSa5pK2mKdl0TruunfD09gfJChgGJhCj:BbXwhm7a1NB4/8vYjDpK8atfx8hDu

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks