General

  • Target

    2025-04-03_c6027df3abfdbfe21d6bb6cc6254e9c7_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader

  • Size

    11.3MB

  • Sample

    250403-e66etaslv9

  • MD5

    c6027df3abfdbfe21d6bb6cc6254e9c7

  • SHA1

    935cfc096554a246fc8f60915469df1feb3f724b

  • SHA256

    8a78119ad7cb6dd727bcccf9ffb7bcaf8a95a895bf5d73d6737b4d9763d16d69

  • SHA512

    d246a732b08463781d8762cfb308312e73b36adb01b7d95dd686c1c4caa51fded5db92d4c980d4b09e61a1091fdb01221895786c929784f21ef9089f76c9ca6e

  • SSDEEP

    196608:9EaOk2c1uwl1CPwDv3uFhi43v13uFnCPws8S/VW08Sr8lQeY3YKmknGzwHIPHd9H:95nEwl1CPwDv3uFY43v13uFnCPwa/VWH

Malware Config

Targets

    • Target

      2025-04-03_c6027df3abfdbfe21d6bb6cc6254e9c7_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader

    • Size

      11.3MB

    • MD5

      c6027df3abfdbfe21d6bb6cc6254e9c7

    • SHA1

      935cfc096554a246fc8f60915469df1feb3f724b

    • SHA256

      8a78119ad7cb6dd727bcccf9ffb7bcaf8a95a895bf5d73d6737b4d9763d16d69

    • SHA512

      d246a732b08463781d8762cfb308312e73b36adb01b7d95dd686c1c4caa51fded5db92d4c980d4b09e61a1091fdb01221895786c929784f21ef9089f76c9ca6e

    • SSDEEP

      196608:9EaOk2c1uwl1CPwDv3uFhi43v13uFnCPws8S/VW08Sr8lQeY3YKmknGzwHIPHd9H:95nEwl1CPwDv3uFY43v13uFnCPwa/VWH

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Mimikatz family

    • mimikatz is an open source tool to dump credentials on Windows

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks