General

  • Target

    2025-04-03_4b8ad282bc117ed1009571fc9864ee27_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader

  • Size

    11.5MB

  • Sample

    250403-d9d93a1ns3

  • MD5

    4b8ad282bc117ed1009571fc9864ee27

  • SHA1

    02236728c141950819b9597fdea93488c8795bb6

  • SHA256

    a0845820dbe245ab0c6e1fce93d8b845fed849e392f80e94387e287407f413e8

  • SHA512

    0f2d343e1a7f0a03d53320479d97b5a487c5d0e3e8af41a686df534361455c09ac843489f622fa206789be00dbaa4e01ba978a18eeaa8ce0fd97307233acee6f

  • SSDEEP

    196608:9EaOk2c1uwl1CPwDv3uFhi43v13uFnCPws8S/VW08Sr8lQeY3YKmknGzwHIPHd9H:95nEwl1CPwDv3uFY43v13uFnCPwa/VWH

Malware Config

Targets

    • Target

      2025-04-03_4b8ad282bc117ed1009571fc9864ee27_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader

    • Size

      11.5MB

    • MD5

      4b8ad282bc117ed1009571fc9864ee27

    • SHA1

      02236728c141950819b9597fdea93488c8795bb6

    • SHA256

      a0845820dbe245ab0c6e1fce93d8b845fed849e392f80e94387e287407f413e8

    • SHA512

      0f2d343e1a7f0a03d53320479d97b5a487c5d0e3e8af41a686df534361455c09ac843489f622fa206789be00dbaa4e01ba978a18eeaa8ce0fd97307233acee6f

    • SSDEEP

      196608:9EaOk2c1uwl1CPwDv3uFhi43v13uFnCPws8S/VW08Sr8lQeY3YKmknGzwHIPHd9H:95nEwl1CPwDv3uFY43v13uFnCPwa/VWH

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Mimikatz family

    • mimikatz is an open source tool to dump credentials on Windows

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks