Resubmissions

04-05-2023 09:54

230504-lxgtesbd74 10

04-05-2023 09:42

230504-lplseabd39 4

General

  • Target

    328f16252f457172a193cceac3a0ecb2.zip

  • Size

    177KB

  • Sample

    230504-lxgtesbd74

  • MD5

    b8a99fa9e3ca78aa3df41f720c553df6

  • SHA1

    6742098ac53328518e49ff675ed7add116313ddb

  • SHA256

    d7fdc1da5b49c49beda0c7f763ad3cfefaa35cd9c5b8f7f7c488eed8193d101a

  • SHA512

    756b43e6e456b866865ec16b323ef63e0b036d5616400dfe09752bad8ced322988fd3a8d55809f8ecf6192cd0af600d0fd163a8409ebee0c3aed9df3333e62d7

  • SSDEEP

    3072:6InBTv7hYjARPrmXwsh0Le4bBgjdIeMZFBxkEO8XN8gUY8V0urRywV4y:6Ig0RP0wDptgjdYXa8X+Z0gywV3

Malware Config

Extracted

Family

kutaki

C2

http://treysbeatend.com/laptop/squared.php

http://terebinnahicc.club/sec/kool.txt

Targets

    • Target

      328f16252f457172a193cceac3a0ecb2

    • Size

      192KB

    • MD5

      328f16252f457172a193cceac3a0ecb2

    • SHA1

      7f87d89ab783c5580d87248cfac439f6ab58c761

    • SHA256

      59147dcffece72594ab38c68b150129ea747158a87caa607cb35bb20fa036d8d

    • SHA512

      b070812e2e263a20ffb9d1834028f1a4e65a15ce97b3be468887c218727add0b4c71aac60f52eb923a4f9ddd493d59aed7efc5d0874cecc9ceea5e973af746a9

    • SSDEEP

      3072:iyCbu89grDkgK8ShiDSshfSfoY4tOuMcFSzrmUjpD2BpNkiTv2IBq1QjAbtaZ:iy0UUrgDSshk4X2jFDUpnTzA9EZ

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Drops startup file

    • Executes dropped EXE

MITRE ATT&CK Enterprise v6

Tasks