General

  • Target

    2025-04-04_ca249af48945b4beb5c1d011979ff938_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader

  • Size

    10.3MB

  • Sample

    250404-gja2ha1tf1

  • MD5

    ca249af48945b4beb5c1d011979ff938

  • SHA1

    8c85fd9483e59ce311d956b5a3d3750e5446a875

  • SHA256

    6455e21e0724b9f09e40f76aa09bc07897c8a361817aa34cc4e39185b232f8ab

  • SHA512

    454344f83300e1efec957bac06a2c353110a6dc7299c8833a7ef8cce24191f245565ee4fcab6e1985e0553080281635176fe733541117a90474d663fb259fa49

  • SSDEEP

    196608:K2c1uwl1CPwDv3uFhi43v13uFnCPws8S/VW08Sr8lQeY3YgOFmknGzwHIPHd9DPK:KnEwl1CPwDv3uFY43v13uFnCPwa/VW0E

Malware Config

Targets

    • Target

      2025-04-04_ca249af48945b4beb5c1d011979ff938_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader

    • Size

      10.3MB

    • MD5

      ca249af48945b4beb5c1d011979ff938

    • SHA1

      8c85fd9483e59ce311d956b5a3d3750e5446a875

    • SHA256

      6455e21e0724b9f09e40f76aa09bc07897c8a361817aa34cc4e39185b232f8ab

    • SHA512

      454344f83300e1efec957bac06a2c353110a6dc7299c8833a7ef8cce24191f245565ee4fcab6e1985e0553080281635176fe733541117a90474d663fb259fa49

    • SSDEEP

      196608:K2c1uwl1CPwDv3uFhi43v13uFnCPws8S/VW08Sr8lQeY3YgOFmknGzwHIPHd9DPK:KnEwl1CPwDv3uFY43v13uFnCPwa/VW0E

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Disables service(s)

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Mimikatz family

    • mimikatz is an open source tool to dump credentials on Windows

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Creates a Windows Service

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks