General
-
Target
10bc8552d9b63666e0788161c13213c7275fdf6a0c4d3ba3d155036be3f4222d.exe
-
Size
500KB
-
Sample
241115-mez3qasjgw
-
MD5
1c0a0f8af63ae1d01f674a15445bc38a
-
SHA1
4b224a051f75ea361c525f3c64d5a50be03ec0e4
-
SHA256
10bc8552d9b63666e0788161c13213c7275fdf6a0c4d3ba3d155036be3f4222d
-
SHA512
45f5b2df88ad94637552bfd2e1b152778d54bb21a3a2bf5052d688cfa74344a29c75ed1af8990620ffe752d793ac270fe449f35ea6cffa20f24195e56b962fa5
-
SSDEEP
12288:zPCKUFlhDzgX/m46A9jmP/uhu/yMS08CkntxYR:zPvslhDWxfmP/UDMS08Ckn3
Behavioral task
behavioral1
Sample
10bc8552d9b63666e0788161c13213c7275fdf6a0c4d3ba3d155036be3f4222d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
10bc8552d9b63666e0788161c13213c7275fdf6a0c4d3ba3d155036be3f4222d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
kutaki
http://treysbeatend.com/laptop/squared.php
Targets
-
-
Target
10bc8552d9b63666e0788161c13213c7275fdf6a0c4d3ba3d155036be3f4222d.exe
-
Size
500KB
-
MD5
1c0a0f8af63ae1d01f674a15445bc38a
-
SHA1
4b224a051f75ea361c525f3c64d5a50be03ec0e4
-
SHA256
10bc8552d9b63666e0788161c13213c7275fdf6a0c4d3ba3d155036be3f4222d
-
SHA512
45f5b2df88ad94637552bfd2e1b152778d54bb21a3a2bf5052d688cfa74344a29c75ed1af8990620ffe752d793ac270fe449f35ea6cffa20f24195e56b962fa5
-
SSDEEP
12288:zPCKUFlhDzgX/m46A9jmP/uhu/yMS08CkntxYR:zPvslhDWxfmP/UDMS08Ckn3
Score6/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-