General

  • Target

    7498bfd956f6d8cced206e7b68adce735fa461eb081ffe048cfbeb38cdb69b60N

  • Size

    861KB

  • Sample

    241020-f18tes1ejd

  • MD5

    fb5773dfd3c5a2c6809243e3637ec030

  • SHA1

    33df56380e6f4539a34485812899724151df7413

  • SHA256

    7498bfd956f6d8cced206e7b68adce735fa461eb081ffe048cfbeb38cdb69b60

  • SHA512

    15a906058fecb609cca55c177203bded0ceb40bb5d4f909f6cd960195e9e78307f515a8afac20b4aa58488d686d58fbfb86668f091a9491131fb1bb69061d750

  • SSDEEP

    24576:nELV7EVFRALV7EVFRiLLV7EVFRVVDwdr2CxfmP/UDMS08Ckn3s:cV7EVFR4V7EVFRivV7EVFRfwdr2Cxfmt

Malware Config

Extracted

Family

kutaki

C2

http://newlinkwotolove.club/love/three.php

Targets

    • Target

      7498bfd956f6d8cced206e7b68adce735fa461eb081ffe048cfbeb38cdb69b60N

    • Size

      861KB

    • MD5

      fb5773dfd3c5a2c6809243e3637ec030

    • SHA1

      33df56380e6f4539a34485812899724151df7413

    • SHA256

      7498bfd956f6d8cced206e7b68adce735fa461eb081ffe048cfbeb38cdb69b60

    • SHA512

      15a906058fecb609cca55c177203bded0ceb40bb5d4f909f6cd960195e9e78307f515a8afac20b4aa58488d686d58fbfb86668f091a9491131fb1bb69061d750

    • SSDEEP

      24576:nELV7EVFRALV7EVFRiLLV7EVFRVVDwdr2CxfmP/UDMS08Ckn3s:cV7EVFR4V7EVFRivV7EVFRfwdr2Cxfmt

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks