General

  • Target

    NEAS.237060068077322d5f33bb309259a5c0.exe

  • Size

    693KB

  • Sample

    231112-qb52cagf44

  • MD5

    237060068077322d5f33bb309259a5c0

  • SHA1

    6e480d71feab775e20b16f4aa80fd4bab8d2b65f

  • SHA256

    5945debf94de6bbe53652b019c7f8be2d8bcee36cd0059ca46a2002ccc70c0c2

  • SHA512

    c2660dc7e38bce83596bfb0d0058e98ae8300e08a3981e0d732d0539d49140487ca6f46ab07ffbaa37f8594b115757d25cb16156b214f408caaa2875b7bf58ed

  • SSDEEP

    12288:2zU8Mu2wf+dBzOxgm46A9jmP/uhu/yMS08CkntxYRZL:2w8t2wf+dBTfmP/UDMS08Ckn3M

Malware Config

Extracted

Family

kutaki

C2

http://linkwotowoto.club/new/two.php

Targets

    • Target

      NEAS.237060068077322d5f33bb309259a5c0.exe

    • Size

      693KB

    • MD5

      237060068077322d5f33bb309259a5c0

    • SHA1

      6e480d71feab775e20b16f4aa80fd4bab8d2b65f

    • SHA256

      5945debf94de6bbe53652b019c7f8be2d8bcee36cd0059ca46a2002ccc70c0c2

    • SHA512

      c2660dc7e38bce83596bfb0d0058e98ae8300e08a3981e0d732d0539d49140487ca6f46ab07ffbaa37f8594b115757d25cb16156b214f408caaa2875b7bf58ed

    • SSDEEP

      12288:2zU8Mu2wf+dBzOxgm46A9jmP/uhu/yMS08CkntxYRZL:2w8t2wf+dBTfmP/UDMS08Ckn3M

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks