General

  • Target

    INCOMETAX_CHALLAN_COPY.zip

  • Size

    654KB

  • Sample

    221025-mae7raccdp

  • MD5

    93f38110f831864aea59999002021c46

  • SHA1

    ed5d3426701441fffa66660b37c9c08e4797c377

  • SHA256

    91b9ab308bdf9f41bf08f6529145a5219c90917be1cca844425a04bf9ee1216e

  • SHA512

    c71119364e4a4dfb63f29235d42d9f8a483c7d94a8ee31db94066bf5331eafbbf8e49dda5603abce2df090715d58debf09871005b554c7493a08daff3abe14b6

  • SSDEEP

    12288:qMKuL4MmuTwMN/u3nUAL8KDof6znM4mA9jmX/uhG5yMw08CknttYRP:qusMmuTpN/u3np2UfLmX/UDMw08Ckn/M

Malware Config

Targets

    • Target

      INCOMETAX_CHALLAN_COPY.exe

    • Size

      1.4MB

    • MD5

      702bb8f393cc2dba7181b407175c2d20

    • SHA1

      5ede8da72c0e18a528edc56c5fb254f894a1aec0

    • SHA256

      5ab0fd363096157c4a3ae912e126b20c7d31d15887b3c0c04a90b6b4d1a2f03b

    • SHA512

      d951434277bc2e4a761fc8ad504bafeaf8e98921d5dc011ceabe3aa3fc36ce0fd06c75d7f10703483a655c80f3ceead706c65330ca94df92c8051abb1e2143ce

    • SSDEEP

      24576:1Sy4uqCSN5l3ksJb7tb1Fdv11KfmP/UDMS08Ckn3f:wyMlafmP/SA8NP

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks