General
-
Target
2025-04-03_951d0e856fcc2450db862bcf414d3e93_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader
-
Size
12.3MB
-
Sample
250403-el6vvayxas
-
MD5
951d0e856fcc2450db862bcf414d3e93
-
SHA1
01e4cefd8164fd38c1d684e2083109f7a6e01dac
-
SHA256
4ac745018943a9e81e99e0abe8b63db8556698900fed337606a6d770788b1089
-
SHA512
57e2f1e73d7e0a853474e61bfd0c8e4313aeaac7ebd408483015c140cc8c8a403e217923a5add4efd1797e6bcfab8617e4243e4036b46d676cc84c2bfe85028e
-
SSDEEP
196608:o3XTYQmknGzwHaOtVPHd9swFBubKLtchEYX2AxFpx4g1JoHZiDzDhpyT4t2L:4ujzwV3BubKyeapug7ciDzDhpyTvL
Malware Config
Targets
-
-
Target
2025-04-03_951d0e856fcc2450db862bcf414d3e93_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader
-
Size
12.3MB
-
MD5
951d0e856fcc2450db862bcf414d3e93
-
SHA1
01e4cefd8164fd38c1d684e2083109f7a6e01dac
-
SHA256
4ac745018943a9e81e99e0abe8b63db8556698900fed337606a6d770788b1089
-
SHA512
57e2f1e73d7e0a853474e61bfd0c8e4313aeaac7ebd408483015c140cc8c8a403e217923a5add4efd1797e6bcfab8617e4243e4036b46d676cc84c2bfe85028e
-
SSDEEP
196608:o3XTYQmknGzwHaOtVPHd9swFBubKLtchEYX2AxFpx4g1JoHZiDzDhpyT4t2L:4ujzwV3BubKyeapug7ciDzDhpyTvL
-
Blackmoon family
-
Detect Blackmoon payload
-
Mimikatz family
-
mimikatz is an open source tool to dump credentials on Windows
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops file in System32 directory
-