General

  • Target

    2025-04-03_e9fad010ceed0ad19f1b9b64f345d266_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader

  • Size

    10.4MB

  • Sample

    250403-ekqr8sywe1

  • MD5

    e9fad010ceed0ad19f1b9b64f345d266

  • SHA1

    2ddebf9fe2edcb0158959039ffe7bd28983482f1

  • SHA256

    347dff9b3d9d055a24e34430173f5a1aacfbb7f8f4fed219a88abcedc969936d

  • SHA512

    393fe329b2e1053438a9d60621c268e4ca448b85ca2ab35d07978c33e0552756659785b9d423c26aad3484ffdc8e14602b32a76fa7d21a8054d3ff930abf26a2

  • SSDEEP

    196608:K2c1uwl1CPwDv3uFhi43v13uFnCPws8S/VW08Sr8lQeY3YgOFmknGzwHIPHd9DPJ:KnEwl1CPwDv3uFY43v13uFnCPwa/VW0B

Malware Config

Targets

    • Target

      2025-04-03_e9fad010ceed0ad19f1b9b64f345d266_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader

    • Size

      10.4MB

    • MD5

      e9fad010ceed0ad19f1b9b64f345d266

    • SHA1

      2ddebf9fe2edcb0158959039ffe7bd28983482f1

    • SHA256

      347dff9b3d9d055a24e34430173f5a1aacfbb7f8f4fed219a88abcedc969936d

    • SHA512

      393fe329b2e1053438a9d60621c268e4ca448b85ca2ab35d07978c33e0552756659785b9d423c26aad3484ffdc8e14602b32a76fa7d21a8054d3ff930abf26a2

    • SSDEEP

      196608:K2c1uwl1CPwDv3uFhi43v13uFnCPws8S/VW08Sr8lQeY3YgOFmknGzwHIPHd9DPJ:KnEwl1CPwDv3uFY43v13uFnCPwa/VW0B

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Disables service(s)

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Mimikatz family

    • mimikatz is an open source tool to dump credentials on Windows

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Creates a Windows Service

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks