General

  • Target

    Tax Payment Challan.zip

  • Size

    394KB

  • Sample

    220909-yvcsxacgdm

  • MD5

    0c591815763318955984c639523cba34

  • SHA1

    8d523b3278f9976fb385dff5c3827ad2bb9cc770

  • SHA256

    a3bacca76001770b9c41ab0dabb1a69eb9cf8bf97e6327d9de2e211228bf5983

  • SHA512

    e2f22922ca85fafceda9147a4fd8f87e19dd1f43581296c3d50f674a054684c8eddae2deca47814d60c39a198fc276639aa8109ab710c534773aa14b11b06339

  • SSDEEP

    6144:ZoG7lCEpcKa5AgecEZLxoPjsfXHk4Es+CSFwC+vzMjSabzK2kUdl0TfumnFD01gY:5CECBA19LUjgv4FavojZzKGa7F32HxuI

Malware Config

Extracted

Family

kutaki

C2

http://newbosslink.xyz/baba/new4.php

Targets

    • Target

      Tax Payment Challan.exe

    • Size

      608KB

    • MD5

      8f3efc2d3a22ed24821833bc665b7a13

    • SHA1

      e9ccdcf94190d17a358acc596f16c8ebec815f47

    • SHA256

      4809718782a72e36b129dd972948e075d160afa5450cec73ad884195fb119dcc

    • SHA512

      02b90a316d9b62a17bce2fd72f686bc8abdaadf962cd70ed9e2dbbcb3d0352c7050f9c909f195b915f6ec7b70667848f702054a2dda2a805b23da89b65f07e1b

    • SSDEEP

      12288:sRvfTemPckUgIhUMgW0cB4/8vYjDpK8atfx8hDu:nNgIhUZ/8vYjEPx8hC

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks