General

  • Target

    2025-04-03_b2b54c597b2ba3396f0eb355048cc42a_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader

  • Size

    11.5MB

  • Sample

    250403-dat68szqv7

  • MD5

    b2b54c597b2ba3396f0eb355048cc42a

  • SHA1

    8fa7fa3814d51b1172a1b365cbb001f762d1eb05

  • SHA256

    dd5783c7b3ee45e6da6f039ff63133e8a1d5f963f62852b2b2d2cbca55bfd74d

  • SHA512

    29438e853da2b8ecb8f7f616701fd579b4fa5832d692b1ba1ee21e9b76abe6ee57c2ebe4ac6e6507d7731fd4ee45b4553b393689342c2c56aa1e313158075393

  • SSDEEP

    196608:9EaOk2c1uwl1CPwDv3uFhi43v13uFnCPws8S/VW08Sr8lQeY3YKmknGzwHIPHd9H:95nEwl1CPwDv3uFY43v13uFnCPwa/VWH

Malware Config

Targets

    • Target

      2025-04-03_b2b54c597b2ba3396f0eb355048cc42a_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader

    • Size

      11.5MB

    • MD5

      b2b54c597b2ba3396f0eb355048cc42a

    • SHA1

      8fa7fa3814d51b1172a1b365cbb001f762d1eb05

    • SHA256

      dd5783c7b3ee45e6da6f039ff63133e8a1d5f963f62852b2b2d2cbca55bfd74d

    • SHA512

      29438e853da2b8ecb8f7f616701fd579b4fa5832d692b1ba1ee21e9b76abe6ee57c2ebe4ac6e6507d7731fd4ee45b4553b393689342c2c56aa1e313158075393

    • SSDEEP

      196608:9EaOk2c1uwl1CPwDv3uFhi43v13uFnCPws8S/VW08Sr8lQeY3YKmknGzwHIPHd9H:95nEwl1CPwDv3uFY43v13uFnCPwa/VWH

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Mimikatz family

    • mimikatz is an open source tool to dump credentials on Windows

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks