General

  • Target

    Recipt.exe

  • Size

    629KB

  • Sample

    221212-nrpyysbc35

  • MD5

    64b06d9408f8681bce5821db705273ce

  • SHA1

    52b1e9f9859a64f71f28fd83c8fe62aa60352589

  • SHA256

    5152a2dee24714603552cf873e34a12b8822df103336e8f0e1da5379720c7348

  • SHA512

    7ec1ad8d8b02d0b9c0fbd63317211288d71123e3c5c9f2df646ad5b5a8f0cf8006ee357ff288ea793981fbde141126ec18fb44786b5d6bda62b0309b9fce84ce

  • SSDEEP

    12288:UiwaCECK5cldtdlEqDPylAwn46A9jmP/uhu/yMS08CkntxYRyL:ZCED5cldtdPDgAw4fmP/UDMS08Ckn35

Malware Config

Extracted

Family

kutaki

C2

http://newbosslink.xyz/baba/new4.php

Targets

    • Target

      Recipt.exe

    • Size

      629KB

    • MD5

      64b06d9408f8681bce5821db705273ce

    • SHA1

      52b1e9f9859a64f71f28fd83c8fe62aa60352589

    • SHA256

      5152a2dee24714603552cf873e34a12b8822df103336e8f0e1da5379720c7348

    • SHA512

      7ec1ad8d8b02d0b9c0fbd63317211288d71123e3c5c9f2df646ad5b5a8f0cf8006ee357ff288ea793981fbde141126ec18fb44786b5d6bda62b0309b9fce84ce

    • SSDEEP

      12288:UiwaCECK5cldtdlEqDPylAwn46A9jmP/uhu/yMS08CkntxYRyL:ZCED5cldtdPDgAw4fmP/UDMS08Ckn35

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks