General

  • Target

    09bcb8ec02584135271310ef3e30265358f52153cda5c12b959b4de60ca5225e

  • Size

    419KB

  • Sample

    240417-q8ssaacb8z

  • MD5

    9507dbc1ec038706caffb934aee40faa

  • SHA1

    ddd0de23901afc120ee21121bcefc1ce410220d5

  • SHA256

    09bcb8ec02584135271310ef3e30265358f52153cda5c12b959b4de60ca5225e

  • SHA512

    0a3b32d5b668c16bb9f5d3c6b04af7503a8b8acdcc3be9541eb8f6f6ba9c95d7184a95a9c19f97905e7847d5a9fe44fc401494a7d3f562c210fda4b80c8c604e

  • SSDEEP

    12288:gjSF0A13Yx887CPdUua5iDwszHm+jrbxm:j+ydlC9sC+jrbxm

Malware Config

Extracted

Family

kutaki

C2

http://linkwotowoto.club/new/two.php

Targets

    • Target

      026fd16b5f3c3d9d23e9a9dbd29af68d89e6ed4d8cadc250e00d798fd489d74a.exe

    • Size

      805KB

    • MD5

      ff22cbacd681684e683e3cc90b5eeb49

    • SHA1

      ff242e78602ea1c38bf81830932858188a682040

    • SHA256

      026fd16b5f3c3d9d23e9a9dbd29af68d89e6ed4d8cadc250e00d798fd489d74a

    • SHA512

      d012ee702f1566fd99658bc231ddb5152001c11f665351c6a269293f00a5d9d67ade90e3d342f30a4b709067c59e7d01c4eecf5d418f0ea638d1857f5f0c3b25

    • SSDEEP

      12288:cwU/v0YM3/BJzGG6bBiNH46A9jmP/uhu/yMS08CkntxYRjL:BK2BN6BiNYfmP/UDMS08Ckn3W

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks