General

  • Target

    4710472a59fc98d7368b3aa1b719f024.bin

  • Size

    366KB

  • Sample

    230127-qargkabb22

  • MD5

    7c82d3450166ffdb23c2eaf9085db1e9

  • SHA1

    6eb52dba9c2adc88d2dd4102fe9684c6e00b79ef

  • SHA256

    4820ced0184d3e1c5752a5a3b19a0ef0faef6d9104715e113ac531fa425f13e9

  • SHA512

    6d35e783e9981250373bc0d7281af40628125f75ffb0ca61cf1d21444acda44c227b7ec956436e6f59a7e96677348260aefee8dd4c4474906735cb00bfb0baec

  • SSDEEP

    6144:6agcbfNaftUPqpCSPXM65xi3GNxolBHZ3Pw0vh8SN0q6wVSWOxHcreCXgpP:THVAUPqp/MV2NxSH5mxq6wVM8r7wl

Malware Config

Extracted

Family

kutaki

C2

http://newbosslink.xyz/baba/new4.php

Targets

    • Target

      2c72daa02805c43f5a35ebca409ad1ddcad3c4b244a9a0579d529b722fea9e6a.exe

    • Size

      453KB

    • MD5

      4710472a59fc98d7368b3aa1b719f024

    • SHA1

      f37094d763df983afce0ab20b49cc4afda0abedc

    • SHA256

      2c72daa02805c43f5a35ebca409ad1ddcad3c4b244a9a0579d529b722fea9e6a

    • SHA512

      ea798060fdc5368815b8cfa68892b6799dedae3354fe6bf8712a1c26b6c7281ea29bef50b2a63ef1d9eaa1dc517842059060eef60a58bc0aa025b9d0caa60ebb

    • SSDEEP

      12288:8U4Tisi646A9jmP/uhu/yMS08CkntxYR/L:rDsufmP/UDMS08Ckn3C

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks