General

  • Target

    https://ucb97db0771cc6db92965a2d607a.dl.dropboxusercontent.com/cd/0/get/CDQciDmPCyFi69LYz5ZBKaG_sy3MRbRP3zn0TgDfVH01UBlplye7eXHQu_lMfUMT_7csbTvVs2Yl18AZQ8CPirCbdaISl13atqhBvV3w7tBlH3-ppY3ZGOuxnsIZ9TAr7_Ie-AYWXlaI6AbcuSjJE8oV/file?dl=1#

  • Sample

    230907-lzag5age4x

Malware Config

Extracted

Family

kutaki

C2

http://treysbeatend.com/laptop/squared.php

http://terebinnahicc.club/sec/kool.txt

Targets

    • Target

      https://ucb97db0771cc6db92965a2d607a.dl.dropboxusercontent.com/cd/0/get/CDQciDmPCyFi69LYz5ZBKaG_sy3MRbRP3zn0TgDfVH01UBlplye7eXHQu_lMfUMT_7csbTvVs2Yl18AZQ8CPirCbdaISl13atqhBvV3w7tBlH3-ppY3ZGOuxnsIZ9TAr7_Ie-AYWXlaI6AbcuSjJE8oV/file?dl=1#

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Drops startup file

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks