General

  • Target

    2025-04-02_423d1987255f7064cda2e41b60f4b95b_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader

  • Size

    12.4MB

  • Sample

    250402-b4zbyayxht

  • MD5

    423d1987255f7064cda2e41b60f4b95b

  • SHA1

    eaa366d44a965def0c4a79a61745185376945529

  • SHA256

    3e6f4538238d0c3c15b1495e2e7b60976259751cae711d4f3d6feeadaabad708

  • SHA512

    c6557812bdfa459a19fb71693e78f950f009558de0fe5ef37ffeae81ee0a84c2856ed94f83813a33b98a1dd30d7e2b75436aff4a09af0fe1f4fd421fd3bbff9b

  • SSDEEP

    196608:o3XTYQmknGzwHaOtVPHd9swFBubKLtchEYX2AxFpx4g1JoHZiDzDhpyT4t2:4ujzwV3BubKyeapug7ciDzDhpyTv

Malware Config

Targets

    • Target

      2025-04-02_423d1987255f7064cda2e41b60f4b95b_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader

    • Size

      12.4MB

    • MD5

      423d1987255f7064cda2e41b60f4b95b

    • SHA1

      eaa366d44a965def0c4a79a61745185376945529

    • SHA256

      3e6f4538238d0c3c15b1495e2e7b60976259751cae711d4f3d6feeadaabad708

    • SHA512

      c6557812bdfa459a19fb71693e78f950f009558de0fe5ef37ffeae81ee0a84c2856ed94f83813a33b98a1dd30d7e2b75436aff4a09af0fe1f4fd421fd3bbff9b

    • SSDEEP

      196608:o3XTYQmknGzwHaOtVPHd9swFBubKLtchEYX2AxFpx4g1JoHZiDzDhpyT4t2:4ujzwV3BubKyeapug7ciDzDhpyTv

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Mimikatz family

    • mimikatz is an open source tool to dump credentials on Windows

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks