General

  • Target

    VISITOR.htm

  • Size

    205B

  • Sample

    230710-fbw4bshe6v

  • MD5

    0d9e328d36728020df58014634db4fa1

  • SHA1

    4468af9b6ea60b08abfc1d7fa7bd575c98dde46d

  • SHA256

    f35a17872d4cfcdf2e425e1552bcfe20389232d58157b117185c2ee810d4aa00

  • SHA512

    05a5a82ad73e0bd2d7c23a943c9ec936e500c96fe0d6ec5008276cf5cafc73e8b79bbaed5f99362a3827168d196faf90ef7a4d0b1dec7264c5f14fefb7397adb

Malware Config

Extracted

Family

kutaki

C2

http://treysbeatend.com/laptop/squared.php

http://terebinnahicc.club/sec/kool.txt

Targets

    • Target

      VISITOR.htm

    • Size

      205B

    • MD5

      0d9e328d36728020df58014634db4fa1

    • SHA1

      4468af9b6ea60b08abfc1d7fa7bd575c98dde46d

    • SHA256

      f35a17872d4cfcdf2e425e1552bcfe20389232d58157b117185c2ee810d4aa00

    • SHA512

      05a5a82ad73e0bd2d7c23a943c9ec936e500c96fe0d6ec5008276cf5cafc73e8b79bbaed5f99362a3827168d196faf90ef7a4d0b1dec7264c5f14fefb7397adb

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Drops startup file

    • Executes dropped EXE

MITRE ATT&CK Enterprise v6

Tasks