MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 39d176c59fce7adab56191645e64f1092a405db9c2c85dc9fe78d419d70f5b6c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Kutaki


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 39d176c59fce7adab56191645e64f1092a405db9c2c85dc9fe78d419d70f5b6c
SHA3-384 hash: 60e170597135f2abc7e28a146418fe65bafbbfaed7ad9e20841fcc3d217412332c31bd885eeec8faa94468cfb80fab2e
SHA1 hash: 06413525306e162647dfee5bd6409f3f53534cbf
MD5 hash: c760a08c71b16f8de88eba514f28add8
humanhash: oxygen-twenty-bacon-one
File name:RAZ_AUTOS.cmd
Download: download sample
Signature Kutaki
File size:1'196'032 bytes
First seen:2020-10-07 04:46:43 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 339420629791b54876a6782e0b2f5f07 (2 x Kutaki)
ssdeep 12288:7IHKkV+TvGxB0uY7BMcJ46A9jmP/uhu/yMS08CkntxYRV:7IHKw+zGxBlfmP/UDMS08Ckn38
Threatray 2'277 similar samples on MalwareBazaar
TLSH ED455C09E6E40C41DCB515355DD6ECB035B3FC298B02A21B37EE7ABF2DB2A904E1535A
Reporter abuse_ch
Tags:cmd Kutaki


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: pro.mxout.rediffmailpro.com
Sending IP: 119.252.152.37
From: RAZA AUTO WHEELS <a67850@baldealer.com>
Subject: Confirmation of Payment From RAZ AUTOS
Attachment: RAZ_AUTOS.zip (contains "RAZ_AUTOS.cmd")

Intelligence


File Origin
# of uploads :
1
# of downloads :
109
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a window
Using the Windows Management Instrumentation requests
Running batch commands
Creating a process with a hidden window
Creating a file
Searching for the window
Deleting a recently created file
Replacing files
Launching a process
Result
Threat name:
Detection:
malicious
Classification:
spyw.evad
Score:
80 / 100
Signature
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Yara detected Kutaki Keylogger
Yara detected VB_Keylogger_Generic
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Johnnie
Status:
Malicious
First seen:
2020-10-07 03:16:35 UTC
AV detection:
25 of 28 (89.29%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Drops file in Windows directory
Unpacked files
SH256 hash:
39d176c59fce7adab56191645e64f1092a405db9c2c85dc9fe78d419d70f5b6c
MD5 hash:
c760a08c71b16f8de88eba514f28add8
SHA1 hash:
06413525306e162647dfee5bd6409f3f53534cbf
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Kutaki

Executable exe 39d176c59fce7adab56191645e64f1092a405db9c2c85dc9fe78d419d70f5b6c

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments