General
-
Target
jti.htm
-
Size
178B
-
Sample
230617-wcpcwace63
-
MD5
ac177a6112a773d9272aa38384fb9a9b
-
SHA1
3d4e24049a3d93ca546ef482c60db7e529cedf18
-
SHA256
505a208666ea25c3a9dad0898c6fd52debdbdb7893f41c3f0898d96b13745be7
-
SHA512
a14945e65d0e76fe8d37173df9ac794bd09b760e854a6f0ec839e50e9d5783124b418b7d8088fbd6fb822c7214453e7e4f4a745c66ba6c4514b855034fbeac2e
Static task
static1
Behavioral task
behavioral1
Sample
jti.htm
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
jti.htm
Resource
win10v2004-20230221-en
Malware Config
Extracted
kutaki
http://linkwotowoto.club/new/two.php
Targets
-
-
Target
jti.htm
-
Size
178B
-
MD5
ac177a6112a773d9272aa38384fb9a9b
-
SHA1
3d4e24049a3d93ca546ef482c60db7e529cedf18
-
SHA256
505a208666ea25c3a9dad0898c6fd52debdbdb7893f41c3f0898d96b13745be7
-
SHA512
a14945e65d0e76fe8d37173df9ac794bd09b760e854a6f0ec839e50e9d5783124b418b7d8088fbd6fb822c7214453e7e4f4a745c66ba6c4514b855034fbeac2e
-
Kutaki Executable
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-