General

  • Target

    f38a290cfaf3d4de3e6251336daadf14f45515c97c8f09ce83c19aa6d5e37b8f

  • Size

    353KB

  • MD5

    1404182cb8a253461dedcceb490af3cb

  • SHA1

    c7525ba615f29f1d7acf63f9dba810c68f8b90bd

  • SHA256

    f38a290cfaf3d4de3e6251336daadf14f45515c97c8f09ce83c19aa6d5e37b8f

  • SHA512

    101fe81ad89d73363fb2b2e98b8db573049bd83a20c910c0a28f07d8e2b4e1300c38a80ed6933e95cc58d49025d8f0a42fe967b063456b7bcf700b85f0266250

  • SSDEEP

    6144:ricnJoyZObNx/7MnWPXi8RlC92/qef6CYjpaCRrEDqpGP6nWQ8R/LOrfQ:WcJFeNx/7eWdU9AfsphpgUWL/LOrY

Score
10/10

Malware Config

Extracted

Family

kutaki

C2

http://treysbeatend.com/laptop/squared.php

http://terebinnahicc.club/sec/kool.txt

Signatures

  • Kutaki family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • f38a290cfaf3d4de3e6251336daadf14f45515c97c8f09ce83c19aa6d5e37b8f
    .zip

    Password: infected

  • d1434a4d08341f78a58b3dbf922831cc4dc1cff634acd7385ed81bba15d848df.exe
    .exe windows:4 windows x86 arch:x86

    70e6405c911e37e751e66490fe6b9801


    Headers

    Imports

    Sections