General
-
Target
e684f0d39d194075f19ab26d52dee092.zip
-
Size
2.1MB
-
Sample
221104-qed22ahdhk
-
MD5
e684f0d39d194075f19ab26d52dee092
-
SHA1
5bc3db5f972c7602ba9cd89fbb7d0edffd860b44
-
SHA256
d0ea011052ff56385e54f47e5f45ae11792a673d22e45ac16661d214b0ed1009
-
SHA512
c30c4dbf7cb759354b112f9b8d144041c60f2d5f06c8fb10396c690e789c34487b6e36445d3bff2327a0cede01196cd4bbb74674af28863ee355836a39d1a4e6
-
SSDEEP
49152:kQnI7FlwmUnJR0YdGahOJs+9GvkSLYRj2HYftrybYiYEFC9/Ge8Xm:kYuIRTG4OJs9kSiSYV+bYEFC9/Ge8W
Behavioral task
behavioral1
Sample
NEFT_Payment.exe
Resource
win7-20220812-en
Malware Config
Extracted
kutaki
http://treysbeatend.com/laptop/squared.php
http://terebinnahicc.club/sec/kool.txt
Targets
-
-
Target
NEFT_Payment.exe
-
Size
2.3MB
-
MD5
d61dd474340f39a91ae57cfd1c997fb0
-
SHA1
22586db543f8770c767ed89c62d7352e80620d8d
-
SHA256
4ca11aff38d3d7b79a6ee372e8aab8ac38157965f975f8540065bc67bc116824
-
SHA512
2df78e05dac0142ce18eb78d0c15f0e7ffcc9a26231603f5ddda6de53d9a17dc7fd0bc55bfeb245e791b5c87e22a0b6dea81b9a830373a41ffe2586cd7f19108
-
SSDEEP
49152:FlkWk5cS7a+9XYaQhZehc4mTYJ78V9gyBn4cMfmP/SA8N:rajJaZ942KQV9hp47fmP/SA8
-
Kutaki Executable
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-