General

  • Target

    jti.htm

  • Size

    178B

  • Sample

    230617-wcpcwace63

  • MD5

    ac177a6112a773d9272aa38384fb9a9b

  • SHA1

    3d4e24049a3d93ca546ef482c60db7e529cedf18

  • SHA256

    505a208666ea25c3a9dad0898c6fd52debdbdb7893f41c3f0898d96b13745be7

  • SHA512

    a14945e65d0e76fe8d37173df9ac794bd09b760e854a6f0ec839e50e9d5783124b418b7d8088fbd6fb822c7214453e7e4f4a745c66ba6c4514b855034fbeac2e

Malware Config

Extracted

Family

kutaki

C2

http://linkwotowoto.club/new/two.php

Targets

    • Target

      jti.htm

    • Size

      178B

    • MD5

      ac177a6112a773d9272aa38384fb9a9b

    • SHA1

      3d4e24049a3d93ca546ef482c60db7e529cedf18

    • SHA256

      505a208666ea25c3a9dad0898c6fd52debdbdb7893f41c3f0898d96b13745be7

    • SHA512

      a14945e65d0e76fe8d37173df9ac794bd09b760e854a6f0ec839e50e9d5783124b418b7d8088fbd6fb822c7214453e7e4f4a745c66ba6c4514b855034fbeac2e

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks