General

  • Target

    2025-04-02_8925e9e07c82410e7215a6ec4d50e3ad_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader

  • Size

    10.2MB

  • Sample

    250402-ds1rqszyfx

  • MD5

    8925e9e07c82410e7215a6ec4d50e3ad

  • SHA1

    6310441d66de7c674d4cd94ddda401d08cd382df

  • SHA256

    028d0fad9af524df96f2fd8e98c031b2ef96e2d7823b8f0e49447087a4ecfe46

  • SHA512

    954d1ceec413981819e0c765e2914996ba86982ce95abc28ebd94705167adaf1f68e29fc2b6d7ca57cffc2db59d250b16e8e38a74c939a388fe802096bb92af1

  • SSDEEP

    196608:K2c1uwl1CPwDv3uFhi43v13uFnCPws8S/VW08Sr8lQeY3YgOFmknGzwHIPHd9DPO:KnEwl1CPwDv3uFY43v13uFnCPwa/VW0W

Malware Config

Targets

    • Target

      2025-04-02_8925e9e07c82410e7215a6ec4d50e3ad_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader

    • Size

      10.2MB

    • MD5

      8925e9e07c82410e7215a6ec4d50e3ad

    • SHA1

      6310441d66de7c674d4cd94ddda401d08cd382df

    • SHA256

      028d0fad9af524df96f2fd8e98c031b2ef96e2d7823b8f0e49447087a4ecfe46

    • SHA512

      954d1ceec413981819e0c765e2914996ba86982ce95abc28ebd94705167adaf1f68e29fc2b6d7ca57cffc2db59d250b16e8e38a74c939a388fe802096bb92af1

    • SSDEEP

      196608:K2c1uwl1CPwDv3uFhi43v13uFnCPws8S/VW08Sr8lQeY3YgOFmknGzwHIPHd9DPO:KnEwl1CPwDv3uFY43v13uFnCPwa/VW0W

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Disables service(s)

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Mimikatz family

    • mimikatz is an open source tool to dump credentials on Windows

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Creates a Windows Service

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks