General

  • Target

    https://vrlabels.com/.well-known/pki-validation/qpkw

  • Sample

    230511-actfyacf5w

Malware Config

Extracted

Family

kutaki

C2

http://treysbeatend.com/laptop/squared.php

http://terebinnahicc.club/sec/kool.txt

Targets

    • Target

      https://vrlabels.com/.well-known/pki-validation/qpkw

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Drops startup file

    • Executes dropped EXE

    • Drops Chrome extension

MITRE ATT&CK Enterprise v6

Tasks