General

  • Target

    2025-04-22_99722a4417b9bc90eb412223ecdc0665_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader

  • Size

    10.7MB

  • Sample

    250422-eqj7mstth1

  • MD5

    99722a4417b9bc90eb412223ecdc0665

  • SHA1

    f65ec3b62222e1183b8b3f9444cec4e36174b4a7

  • SHA256

    afeb622771b3113b2a6534c1c5099cb404856275748192d420dfcd14569047c2

  • SHA512

    12032b38ea52aa9160458f7607a0b295b81cb16fbcbd1136b0942b44f9f774cba749b7bf6058b94636c873dbb413e6a39b49c1de374a9d07b1ddf4d45283f40d

  • SSDEEP

    196608:K2c1uwl1CPwDv3uFhi43v13uFnCPws8S/VW08Sr8lQeY3YgOFmknGzwHIPHd9DPK:KnEwl1CPwDv3uFY43v13uFnCPwa/VW0E

Malware Config

Targets

    • Target

      2025-04-22_99722a4417b9bc90eb412223ecdc0665_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader

    • Size

      10.7MB

    • MD5

      99722a4417b9bc90eb412223ecdc0665

    • SHA1

      f65ec3b62222e1183b8b3f9444cec4e36174b4a7

    • SHA256

      afeb622771b3113b2a6534c1c5099cb404856275748192d420dfcd14569047c2

    • SHA512

      12032b38ea52aa9160458f7607a0b295b81cb16fbcbd1136b0942b44f9f774cba749b7bf6058b94636c873dbb413e6a39b49c1de374a9d07b1ddf4d45283f40d

    • SSDEEP

      196608:K2c1uwl1CPwDv3uFhi43v13uFnCPws8S/VW08Sr8lQeY3YgOFmknGzwHIPHd9DPK:KnEwl1CPwDv3uFY43v13uFnCPwa/VW0E

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Disables service(s)

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Mimikatz family

    • mimikatz is an open source tool to dump credentials on Windows

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Creates a Windows Service

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks