General

  • Target

    541ce09cec54e8df1f14a5e25064929e3f3c151f0d68dd6968d229668443444b

  • Size

    754KB

  • Sample

    240524-smpjvaae89

  • MD5

    cc3dea0182a77c7ca10925e2c180bc62

  • SHA1

    537cd49fa4abf265b69d9d0de982373544c643fc

  • SHA256

    541ce09cec54e8df1f14a5e25064929e3f3c151f0d68dd6968d229668443444b

  • SHA512

    99655f1a80a9aacb5f77917700f4303a53368e62d7807196b6e5fa917a40382523ea9ab42a81ba66d7c2bab12ff291bd2efc0399922ae578f8332e982fda40e0

  • SSDEEP

    12288:K39b2oWvRykNICNEZjwJxtk46A9jmP/uhu/yMS08CkntxYRcBAL:KeNIuEZjqxVfmP/UDMS08Ckn3A

Malware Config

Extracted

Family

kutaki

C2

http://newlinkwotolove.club/love/three.php

Targets

    • Target

      541ce09cec54e8df1f14a5e25064929e3f3c151f0d68dd6968d229668443444b

    • Size

      754KB

    • MD5

      cc3dea0182a77c7ca10925e2c180bc62

    • SHA1

      537cd49fa4abf265b69d9d0de982373544c643fc

    • SHA256

      541ce09cec54e8df1f14a5e25064929e3f3c151f0d68dd6968d229668443444b

    • SHA512

      99655f1a80a9aacb5f77917700f4303a53368e62d7807196b6e5fa917a40382523ea9ab42a81ba66d7c2bab12ff291bd2efc0399922ae578f8332e982fda40e0

    • SSDEEP

      12288:K39b2oWvRykNICNEZjwJxtk46A9jmP/uhu/yMS08CkntxYRcBAL:KeNIuEZjqxVfmP/UDMS08Ckn3A

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Tasks