General

  • Target

    2025-04-22_457f582efe68576b39e1e54c319c923f_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader

  • Size

    12.7MB

  • Sample

    250422-bm3b9stl12

  • MD5

    457f582efe68576b39e1e54c319c923f

  • SHA1

    75878071f6fd7ce0dac3b90529c15699941528f9

  • SHA256

    adfcffc7faf99bfb32d9de46b8c137759fbcc39885631bb6a218746cab0cd136

  • SHA512

    28deb16b0bcf3fef45d051c0c72dfc106c243002cd31b4fcaf79696133325821d101bc53b13900208883ed2e7f9c1437cc528a321b064d0d0a52bd2d65387176

  • SSDEEP

    196608:o3XTYQmknGzwHaOtVPHd9swFBubKLtchEYX2AxFpx4g1JoHZiDzDhpyT4t23:4ujzwV3BubKyeapug7ciDzDhpyTv3

Malware Config

Targets

    • Target

      2025-04-22_457f582efe68576b39e1e54c319c923f_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader

    • Size

      12.7MB

    • MD5

      457f582efe68576b39e1e54c319c923f

    • SHA1

      75878071f6fd7ce0dac3b90529c15699941528f9

    • SHA256

      adfcffc7faf99bfb32d9de46b8c137759fbcc39885631bb6a218746cab0cd136

    • SHA512

      28deb16b0bcf3fef45d051c0c72dfc106c243002cd31b4fcaf79696133325821d101bc53b13900208883ed2e7f9c1437cc528a321b064d0d0a52bd2d65387176

    • SSDEEP

      196608:o3XTYQmknGzwHaOtVPHd9swFBubKLtchEYX2AxFpx4g1JoHZiDzDhpyT4t23:4ujzwV3BubKyeapug7ciDzDhpyTv3

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Mimikatz family

    • mimikatz is an open source tool to dump credentials on Windows

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v16

Tasks