General

  • Target

    Receipt.zip

  • Size

    2.1MB

  • Sample

    221125-kky2haeb68

  • MD5

    55d4862f67fedf1b6ea943ebebb4f2e7

  • SHA1

    75726fa52440068744514027f8660fba668d1785

  • SHA256

    4efac9d701417e16e933738583b01d08690821a197dfd7d3b62dc20f91e97208

  • SHA512

    42f9eb8ca8287e5d16aca396a09d3ead9234868f908d9efdede69b1352173c6cdcc6efe8ef55719ce2edbf391b2b66666375c79ea09b95fb21dfb37934f0c8f0

  • SSDEEP

    49152:y5ANa2To/Gnahg0B3aYko0Vvy8y27M1fu/qX/mU8Vxqr:yGv/a20Fvko05yw7iu/qX/mU8yr

Malware Config

Extracted

Family

kutaki

C2

http://treysbeatend.com/laptop/squared.php

http://terebinnahicc.club/sec/kool.txt

Targets

    • Target

      Receipt.exe

    • Size

      2.3MB

    • MD5

      5e8111e5a3f79e95825be8cb1b7ba3be

    • SHA1

      4c3cb2f62dacd306cd7dfe16ea00b6249c5a8753

    • SHA256

      a1008233dd7bb7621f533591ff1715d49c123eb1b4a6daab1bd0a357177b9a24

    • SHA512

      403cbc55b7c71cd93ef98eca306f92ce38c294cd07f01de4447f97068b448012a66e2cf7f342bf06eba011ddedd2db2d281fb783186d5638ade3362f529cd3ad

    • SSDEEP

      49152:BkWk5cS7a+9XYaQ3Zehc4mTYJ78V9gyBn4cifmP/SA8N:NajJEZ942KQV9hp41fmP/SA8

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks