General

  • Target

    2025-04-02_4c7c7fa92e4c750fea102db41c44916c_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader

  • Size

    12.3MB

  • Sample

    250402-b7lv1syyc1

  • MD5

    4c7c7fa92e4c750fea102db41c44916c

  • SHA1

    d94be2c58e3faf915552afeee42b4d0505a9ce12

  • SHA256

    96e1818b4e1c09bc8df9ed6bbf192fc748f60945e16ba989563d639f0a1e8db6

  • SHA512

    ff2ce42730234df34b6afe48291b29c4c292a33272beaf1e1a1c348068f56a5e7846d4b356814161365c337d2e573b796a26d123fc8a6c3ec3aafea9f8a4a663

  • SSDEEP

    196608:o3XTYQmknGzwHaOtVPHd9swFBubKLtchEYX2AxFpx4g1JoHZiDzDhpyT4t2b:4ujzwV3BubKyeapug7ciDzDhpyTvb

Malware Config

Targets

    • Target

      2025-04-02_4c7c7fa92e4c750fea102db41c44916c_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader

    • Size

      12.3MB

    • MD5

      4c7c7fa92e4c750fea102db41c44916c

    • SHA1

      d94be2c58e3faf915552afeee42b4d0505a9ce12

    • SHA256

      96e1818b4e1c09bc8df9ed6bbf192fc748f60945e16ba989563d639f0a1e8db6

    • SHA512

      ff2ce42730234df34b6afe48291b29c4c292a33272beaf1e1a1c348068f56a5e7846d4b356814161365c337d2e573b796a26d123fc8a6c3ec3aafea9f8a4a663

    • SSDEEP

      196608:o3XTYQmknGzwHaOtVPHd9swFBubKLtchEYX2AxFpx4g1JoHZiDzDhpyT4t2b:4ujzwV3BubKyeapug7ciDzDhpyTvb

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Mimikatz family

    • mimikatz is an open source tool to dump credentials on Windows

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Enterprise v15

Tasks