General

  • Target

    d27507faa20cdd3e772d43965d344408

  • Size

    376KB

  • Sample

    240318-dyg7ksgb21

  • MD5

    d27507faa20cdd3e772d43965d344408

  • SHA1

    21e73dca70ca864eec82221b8a6f0447ffbf8d07

  • SHA256

    ae7fbecf508de083bedb5e52af2f42d74c007966ab6faac00072597a9afd211f

  • SHA512

    efcb4b14e1ce2b329531f1f35924205e3eb062defb11fe50b955b0885cc870e6f4ddc37cd59728d649d24338bba516c707f86e7589f86659c7de4d1beb3c93be

  • SSDEEP

    6144:4IaXScg1S4GlA9jmHv/VCSY3hw9lMbk6u1QMS0y+lqiHTonWryFDYRF:246A9jmP/uhu/yMS08CkntxYRF

Malware Config

Extracted

Family

kutaki

C2

http://sdaskmda.club/papa/love.php

http://terebinnahicc.club/sec/kool.txt

Targets

    • Target

      d27507faa20cdd3e772d43965d344408

    • Size

      376KB

    • MD5

      d27507faa20cdd3e772d43965d344408

    • SHA1

      21e73dca70ca864eec82221b8a6f0447ffbf8d07

    • SHA256

      ae7fbecf508de083bedb5e52af2f42d74c007966ab6faac00072597a9afd211f

    • SHA512

      efcb4b14e1ce2b329531f1f35924205e3eb062defb11fe50b955b0885cc870e6f4ddc37cd59728d649d24338bba516c707f86e7589f86659c7de4d1beb3c93be

    • SSDEEP

      6144:4IaXScg1S4GlA9jmHv/VCSY3hw9lMbk6u1QMS0y+lqiHTonWryFDYRF:246A9jmP/uhu/yMS08CkntxYRF

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks