General

  • Target

    2025-04-03_e3c026e21925e23b0caf141288755455_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader

  • Size

    10.5MB

  • Sample

    250403-lmq94sxl16

  • MD5

    e3c026e21925e23b0caf141288755455

  • SHA1

    52ce369fdfe5330ea4907a8585360abf0a9f6ce4

  • SHA256

    97ab1ce3941fd6ec3bc61c2c7431ae9dd9f913f131773e4698cb134171d8f1d4

  • SHA512

    3273a89f6a4ed1ec94c8e9aa043d03613f5251c3eb415c62aecba0b3cd3b024613a2b2295818c737e6ad39935e73093fcdc23a06fe5383ba1544e1781c61ab5c

  • SSDEEP

    196608:K2c1uwl1CPwDv3uFhi43v13uFnCPws8S/VW08Sr8lQeY3YgOFmknGzwHIPHd9DPi:KnEwl1CPwDv3uFY43v13uFnCPwa/VW0K

Malware Config

Targets

    • Target

      2025-04-03_e3c026e21925e23b0caf141288755455_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader

    • Size

      10.5MB

    • MD5

      e3c026e21925e23b0caf141288755455

    • SHA1

      52ce369fdfe5330ea4907a8585360abf0a9f6ce4

    • SHA256

      97ab1ce3941fd6ec3bc61c2c7431ae9dd9f913f131773e4698cb134171d8f1d4

    • SHA512

      3273a89f6a4ed1ec94c8e9aa043d03613f5251c3eb415c62aecba0b3cd3b024613a2b2295818c737e6ad39935e73093fcdc23a06fe5383ba1544e1781c61ab5c

    • SSDEEP

      196608:K2c1uwl1CPwDv3uFhi43v13uFnCPws8S/VW08Sr8lQeY3YgOFmknGzwHIPHd9DPi:KnEwl1CPwDv3uFY43v13uFnCPwa/VW0K

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Disables service(s)

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Mimikatz family

    • mimikatz is an open source tool to dump credentials on Windows

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Creates a Windows Service

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks