General

  • Target

    385aa9bd24be994cba1cd917c9601851.zip

  • Size

    405KB

  • Sample

    240226-te3beaaa67

  • MD5

    385aa9bd24be994cba1cd917c9601851

  • SHA1

    5ef02292e5c969c9cf56e36133cb36438ecb66f3

  • SHA256

    e4adf875355662338b487d33f7235b3987f2d5c06c8c6772a374a8d65e353ee0

  • SHA512

    61e73c0e4fbcf2633a8c5e5ea92f6983cee7c5df905d0397a945e30426c0b4d398372c2cd8cd9781bb7ad5a0efecb20eaa352df3c494fd8f4635f249b8762856

  • SSDEEP

    12288:rONSucT/jFFaL64wA9jY9/shcT2MSC8IknjlYR+:yNSPD7wldY9/iHMSC8Iknh5

Malware Config

Extracted

Family

kutaki

C2

http://linkwotowoto.club/new/two.php

Targets

    • Target

      Tax Payment Challan.exe

    • Size

      617KB

    • MD5

      9b719e21e56dfe22fe282fcd496d83c6

    • SHA1

      f0229d661757258893ca0f0b9daf21ac52d71364

    • SHA256

      314354ecd6851e77c74ab85bba3a53c9f2ee6c95010410f8ef3c5c435600ecb2

    • SHA512

      c969de50ba51747e457aed23a2f60a131e055d217c8e941ea03e0f51a2f441d4dc4f105ae78418f7be9bec326f7949ebabe174e9c50226c6ef8c59c57418750e

    • SSDEEP

      12288:eFT8EyAFXYN1hP46A9jmP/uhu/yMS08CkntxYRmqL:uYlAFXqAfmP/UDMS08Ckn3A

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks