MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0401d7fd0924a8ebf835b1ba3940dd66f49810d442277ff15ac50c517f00c788. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Kutaki


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 0401d7fd0924a8ebf835b1ba3940dd66f49810d442277ff15ac50c517f00c788
SHA3-384 hash: 59690c3ab7cb3d1ef40096fad4cccb3b7ab74eb45d3b5269b96ac3b01f9f597a6dc28cbcd5ac98b11c1c3ee9dcdb276b
SHA1 hash: 49fe836cf08a3feaf6f2aa2f74ab14eadc0ab7dd
MD5 hash: b67c3ccdf2d0675e64e045931d26991e
humanhash: failed-alpha-fifteen-west
File name:RTGS Payment Confirmation.exe
Download: download sample
Signature Kutaki
File size:851'968 bytes
First seen:2022-04-14 08:52:56 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ae6b891cbf9aa95048be52404a6e1f7b (1 x Kutaki)
ssdeep 12288:Oc1zg3bUZIycPkE00AAbpfLd7QcX4kB46A9jmP/uhu/yMS08CkntxYR+:OVoZ1mpfLd7ofmP/UDMS08Ckn3H
Threatray 38 similar samples on MalwareBazaar
TLSH T1E6059C13A612B01AF562F4F02924F2C517282F760587A697EBB13B4632B1DD776E032F
TrID 75.8% (.EXE) Win32 Executable Microsoft Visual Basic 6 (82067/2/8)
9.7% (.EXE) Win64 Executable (generic) (10523/12/4)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.1% (.EXE) Win32 Executable (generic) (4505/5/1)
1.8% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon ec6ce4c4c8d4b0c0 (1 x Kutaki)
Reporter GovCERT_CH
Tags:exe Kutaki

Intelligence


File Origin
# of uploads :
1
# of downloads :
313
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
RTGS Payment Confirmation.exe
Verdict:
Suspicious activity
Analysis date:
2022-04-14 09:01:38 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
Sending a custom TCP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
spyw
Score:
72 / 100
Signature
Antivirus / Scanner detection for submitted sample
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Yara detected Kutaki Keylogger
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2022-04-14 01:11:16 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:kutaki
Behaviour
Suspicious use of SetWindowsHookEx
Unpacked files
SH256 hash:
0401d7fd0924a8ebf835b1ba3940dd66f49810d442277ff15ac50c517f00c788
MD5 hash:
b67c3ccdf2d0675e64e045931d26991e
SHA1 hash:
49fe836cf08a3feaf6f2aa2f74ab14eadc0ab7dd
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Kutaki

Executable exe 0401d7fd0924a8ebf835b1ba3940dd66f49810d442277ff15ac50c517f00c788

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments