General

  • Target

    e684f0d39d194075f19ab26d52dee092.zip

  • Size

    2.1MB

  • MD5

    e684f0d39d194075f19ab26d52dee092

  • SHA1

    5bc3db5f972c7602ba9cd89fbb7d0edffd860b44

  • SHA256

    d0ea011052ff56385e54f47e5f45ae11792a673d22e45ac16661d214b0ed1009

  • SHA512

    c30c4dbf7cb759354b112f9b8d144041c60f2d5f06c8fb10396c690e789c34487b6e36445d3bff2327a0cede01196cd4bbb74674af28863ee355836a39d1a4e6

  • SSDEEP

    49152:kQnI7FlwmUnJR0YdGahOJs+9GvkSLYRj2HYftrybYiYEFC9/Ge8Xm:kYuIRTG4OJs9kSiSYV+bYEFC9/Ge8W

Score
10/10

Malware Config

Extracted

Family

kutaki

C2

http://treysbeatend.com/laptop/squared.php

http://terebinnahicc.club/sec/kool.txt

Signatures

  • Kutaki Executable 1 IoCs
  • Kutaki family

Files

  • e684f0d39d194075f19ab26d52dee092.zip
    .zip
  • NEFT_Payment.exe
    .exe windows x86

    d83deedae48034a6548e439d4224ca5c


    Headers

    Imports

    Sections