General

  • Target

    3.exe

  • Size

    541KB

  • Sample

    230105-lthasafa8s

  • MD5

    86f76a5b4137c86d3eed43cfac187f7e

  • SHA1

    a7a8e3c6cd76b6c4a05f6747c75cdd4587c09725

  • SHA256

    9b3c2853944f7dc6985774f53efcdf30b357f3dce5abd8d6b0f924b033d25911

  • SHA512

    9d36390d5b016ed9a27678dc170c6ab95fe5fa0a4b91ac9abd89b99593fa7259efd6f6a5f86943c1b0bb00357e2404688d3cd6df4490cfe592d2b2401c4c25f3

  • SSDEEP

    12288:+2D18PzBRRHsj1SFKihy46A9jmP/uhu/yMS08CkntxYRRL:ypMj1SHfmP/UDMS08Ckn3I

Malware Config

Extracted

Family

kutaki

C2

http://newbosslink.xyz/baba/new4.php

Targets

    • Target

      3.exe

    • Size

      541KB

    • MD5

      86f76a5b4137c86d3eed43cfac187f7e

    • SHA1

      a7a8e3c6cd76b6c4a05f6747c75cdd4587c09725

    • SHA256

      9b3c2853944f7dc6985774f53efcdf30b357f3dce5abd8d6b0f924b033d25911

    • SHA512

      9d36390d5b016ed9a27678dc170c6ab95fe5fa0a4b91ac9abd89b99593fa7259efd6f6a5f86943c1b0bb00357e2404688d3cd6df4490cfe592d2b2401c4c25f3

    • SSDEEP

      12288:+2D18PzBRRHsj1SFKihy46A9jmP/uhu/yMS08CkntxYRRL:ypMj1SHfmP/UDMS08Ckn3I

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks