General

  • Target

    TMB_NEFT.exe

  • Size

    2.4MB

  • Sample

    221114-yjrgxsdc27

  • MD5

    c6a75de5782bf853b0d79935f482f888

  • SHA1

    e15600180a75dfde9d04cd8f8d45d8339fb36e13

  • SHA256

    3cd0709d63383d5819f979eeca64178334abf444e8a5609ab3f35f26dd30806d

  • SHA512

    74769668edc7027d26b2b77ef743544dcd73c393aa121af277d1fad68ee1902e7acce1e686f8e7f874003f73e885cd550ecdbd94a79527782b3591e28c6efebe

  • SSDEEP

    49152:2kWk5cS7a+9XYaQpZehc4mTYJ78V9gyBn4coQfmP/SA8N:aajJGZ942KQV9hp4DQfmP/SA8

Malware Config

Extracted

Family

kutaki

C2

http://treysbeatend.com/laptop/squared.php

http://terebinnahicc.club/sec/kool.txt

Targets

    • Target

      TMB_NEFT.exe

    • Size

      2.4MB

    • MD5

      c6a75de5782bf853b0d79935f482f888

    • SHA1

      e15600180a75dfde9d04cd8f8d45d8339fb36e13

    • SHA256

      3cd0709d63383d5819f979eeca64178334abf444e8a5609ab3f35f26dd30806d

    • SHA512

      74769668edc7027d26b2b77ef743544dcd73c393aa121af277d1fad68ee1902e7acce1e686f8e7f874003f73e885cd550ecdbd94a79527782b3591e28c6efebe

    • SSDEEP

      49152:2kWk5cS7a+9XYaQpZehc4mTYJ78V9gyBn4coQfmP/SA8N:aajJGZ942KQV9hp4DQfmP/SA8

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks