General

  • Target

    97a4007da195e9a00bd0e105813f1564.bin

  • Size

    336KB

  • Sample

    231110-c31n2shh6t

  • MD5

    2753e9a67a6202af1ee47df987669720

  • SHA1

    c72c38b0a1507ed5ca9e75a3a97a1af0351709ce

  • SHA256

    6df298c7b4e3a90153830ba400cf5dbcdf746a9eb5d1fba8a7071356799e2886

  • SHA512

    25c7622609b09747de3077813f72a47e864ae755895dc1eb26116b877f58b0273083220b3c736218769ad0dd969024046be3d0b36b7f2b25634840384494b8e3

  • SSDEEP

    6144:ipw8qVezVipWx/HOJVWluX/CLnOkuxR9CI6VGqDMJl9YQNuDKh/IQ0:ip/zdx/uJQleCrzuge9YQIDQi

Malware Config

Extracted

Family

kutaki

C2

http://linkwotowoto.club/new/two.php

Targets

    • Target

      Challan.exe

    • Size

      501KB

    • MD5

      816cdd0d2e0852404804a683d1cd1b53

    • SHA1

      9842b46047c8ef18a2041a7a35fe3b51515dd829

    • SHA256

      2114e284c9636a3b015aadb156369d5c55dc29541bc9f27ecf3724f16a65fa8d

    • SHA512

      9648bb75a15afb57baeb7c9becf994dece54f499f04df344210c8241839d493599b71cf7ae7a9f4f790009ba3a9b8d2f80df7db41bac5b78edce20bd1a115cf2

    • SSDEEP

      12288:6Ycs+XKy/AZe+e9AP8LP810o4HfyNQlQj0DunOq0Mte9oIopkyd+wMeMIC10pqTO:6Ycs+XKy/AZeJ9AP8LP810o4HfyNQlQn

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks