MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 39d176c59fce7adab56191645e64f1092a405db9c2c85dc9fe78d419d70f5b6c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Kutaki
Vendor detections: 6
| SHA256 hash: | 39d176c59fce7adab56191645e64f1092a405db9c2c85dc9fe78d419d70f5b6c |
|---|---|
| SHA3-384 hash: | 60e170597135f2abc7e28a146418fe65bafbbfaed7ad9e20841fcc3d217412332c31bd885eeec8faa94468cfb80fab2e |
| SHA1 hash: | 06413525306e162647dfee5bd6409f3f53534cbf |
| MD5 hash: | c760a08c71b16f8de88eba514f28add8 |
| humanhash: | oxygen-twenty-bacon-one |
| File name: | RAZ_AUTOS.cmd |
| Download: | download sample |
| Signature | Kutaki |
| File size: | 1'196'032 bytes |
| First seen: | 2020-10-07 04:46:43 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 339420629791b54876a6782e0b2f5f07 (2 x Kutaki) |
| ssdeep | 12288:7IHKkV+TvGxB0uY7BMcJ46A9jmP/uhu/yMS08CkntxYRV:7IHKw+zGxBlfmP/UDMS08Ckn38 |
| Threatray | 2'277 similar samples on MalwareBazaar |
| TLSH | ED455C09E6E40C41DCB515355DD6ECB035B3FC298B02A21B37EE7ABF2DB2A904E1535A |
| Reporter | |
| Tags: | cmd Kutaki |
abuse_ch
Malspam distributing unidentified malware:HELO: pro.mxout.rediffmailpro.com
Sending IP: 119.252.152.37
From: RAZA AUTO WHEELS <a67850@baldealer.com>
Subject: Confirmation of Payment From RAZ AUTOS
Attachment: RAZ_AUTOS.zip (contains "RAZ_AUTOS.cmd")
Intelligence
File Origin
# of uploads :
1
# of downloads :
109
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Result
Verdict:
Suspicious
Maliciousness:
Behaviour
Creating a window
Using the Windows Management Instrumentation requests
Running batch commands
Creating a process with a hidden window
Creating a file
Searching for the window
Deleting a recently created file
Replacing files
Launching a process
Result
Threat name:
Kutaki
Detection:
malicious
Classification:
spyw.evad
Score:
80 / 100
Signature
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Yara detected Kutaki Keylogger
Yara detected VB_Keylogger_Generic
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Johnnie
Status:
Malicious
First seen:
2020-10-07 03:16:35 UTC
AV detection:
25 of 28 (89.29%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
unknown
Similar samples:
+ 2'267 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
10/10
Tags:
n/a
Behaviour
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Drops file in Windows directory
Unpacked files
SH256 hash:
39d176c59fce7adab56191645e64f1092a405db9c2c85dc9fe78d419d70f5b6c
MD5 hash:
c760a08c71b16f8de88eba514f28add8
SHA1 hash:
06413525306e162647dfee5bd6409f3f53534cbf
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.