General

  • Target

    2025-04-03_951d0e856fcc2450db862bcf414d3e93_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader

  • Size

    12.3MB

  • Sample

    250403-el6vvayxas

  • MD5

    951d0e856fcc2450db862bcf414d3e93

  • SHA1

    01e4cefd8164fd38c1d684e2083109f7a6e01dac

  • SHA256

    4ac745018943a9e81e99e0abe8b63db8556698900fed337606a6d770788b1089

  • SHA512

    57e2f1e73d7e0a853474e61bfd0c8e4313aeaac7ebd408483015c140cc8c8a403e217923a5add4efd1797e6bcfab8617e4243e4036b46d676cc84c2bfe85028e

  • SSDEEP

    196608:o3XTYQmknGzwHaOtVPHd9swFBubKLtchEYX2AxFpx4g1JoHZiDzDhpyT4t2L:4ujzwV3BubKyeapug7ciDzDhpyTvL

Malware Config

Targets

    • Target

      2025-04-03_951d0e856fcc2450db862bcf414d3e93_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader

    • Size

      12.3MB

    • MD5

      951d0e856fcc2450db862bcf414d3e93

    • SHA1

      01e4cefd8164fd38c1d684e2083109f7a6e01dac

    • SHA256

      4ac745018943a9e81e99e0abe8b63db8556698900fed337606a6d770788b1089

    • SHA512

      57e2f1e73d7e0a853474e61bfd0c8e4313aeaac7ebd408483015c140cc8c8a403e217923a5add4efd1797e6bcfab8617e4243e4036b46d676cc84c2bfe85028e

    • SSDEEP

      196608:o3XTYQmknGzwHaOtVPHd9swFBubKLtchEYX2AxFpx4g1JoHZiDzDhpyT4t2L:4ujzwV3BubKyeapug7ciDzDhpyTvL

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Mimikatz family

    • mimikatz is an open source tool to dump credentials on Windows

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks