General

  • Target

    file.exe

  • Size

    597KB

  • Sample

    240219-g9cb9aba28

  • MD5

    ec665f89e74d25d37731652989ad3c2e

  • SHA1

    82818a05e393db30f6c72c13cf8086b1dd6f67c7

  • SHA256

    620fafa603b8414c4bb1616f52c37335f2903df7af4da487926a6c6965ee2f78

  • SHA512

    c774ded25b26229a97e42575b6b13415807c43b76b7eb36081a507ca407090885821e336d4f23ae61cdd627f3daad2a433c6d55eeab7039623c5c152a8a099f8

  • SSDEEP

    12288:qK1aFT8EUJHvXH/Xgv46A9jmP/uhu/yMS08CkntxYRWaL:qBYLJvXH/wgfmP/UDMS08Ckn3E

Malware Config

Extracted

Family

kutaki

C2

http://linkwotowoto.club/new/two.php

Targets

    • Target

      file.exe

    • Size

      597KB

    • MD5

      ec665f89e74d25d37731652989ad3c2e

    • SHA1

      82818a05e393db30f6c72c13cf8086b1dd6f67c7

    • SHA256

      620fafa603b8414c4bb1616f52c37335f2903df7af4da487926a6c6965ee2f78

    • SHA512

      c774ded25b26229a97e42575b6b13415807c43b76b7eb36081a507ca407090885821e336d4f23ae61cdd627f3daad2a433c6d55eeab7039623c5c152a8a099f8

    • SSDEEP

      12288:qK1aFT8EUJHvXH/Xgv46A9jmP/uhu/yMS08CkntxYRWaL:qBYLJvXH/wgfmP/UDMS08Ckn3E

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks