MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 61d451ce5a169591bd4e8633c9030a8afb54027e66dbae6127984caa48bc2568. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
MimiKatz
Vendor detections: 7
| SHA256 hash: | 61d451ce5a169591bd4e8633c9030a8afb54027e66dbae6127984caa48bc2568 |
|---|---|
| SHA3-384 hash: | 0886a90a2dc3d9f40fc9e3633b414eb4aa72f485d4e2f6b84bc66750252c0326bd7db21b3102edba9a31f3d0c4333897 |
| SHA1 hash: | 9fb24eaef2da9aa81f5cc90217092b09040421ff |
| MD5 hash: | 7586a115a915c813f58059386db4f9ce |
| humanhash: | illinois-aspen-october-timing |
| File name: | 61D451CE5A169591BD4E8633C9030A8AFB54027E66DBAE6127984CAA48BC2568.exe |
| Download: | download sample |
| Signature | MimiKatz |
| File size: | 4'440'496 bytes |
| First seen: | 2022-05-28 13:54:42 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 1ff847646487d56f85778df99ff3728a (4 x RedLineStealer, 3 x Nitol, 2 x Gh0stRAT) |
| ssdeep | 98304:+06FOznLo0+Dd6uxcl4j8YTyaBr/6mNcOBiFeHuOPnFx:+3F6n80W6uGaj8k5SmNcO+qFx |
| Threatray | 26 similar samples on MalwareBazaar |
| TLSH | T14B262343F3C1D1B9D9B9C0BA80549AB24B642E3587BAC4E777D0762B8E701C0AB36F55 |
| TrID | 68.5% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 10.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 9.2% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4) 3.6% (.EXE) Win64 Executable (generic) (10523/12/4) 2.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | 9ee8e8f0e8e0e98e (1 x Gh0stRAT, 1 x MimiKatz) |
| Reporter | |
| Tags: | exe mimikatz RAT |
Intelligence
File Origin
# of uploads :
1
# of downloads :
406
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
61D451CE5A169591BD4E8633C9030A8AFB54027E66DBAE6127984CAA48BC2568.exe
Verdict:
No threats detected
Analysis date:
2022-05-28 13:55:36 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Suspicious
Maliciousness:
Behaviour
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Searching for synchronization primitives
Creating a window
Searching for the window
Creating a file
Enabling the 'hidden' option for recently created files
Creating a process with a hidden window
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
greyware obfuscated overlay packed shell32.dll
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Unknown
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
72 / 100
Signature
Antivirus detection for dropped file
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Behaviour
Behavior Graph:
Gathering data
Threat name:
Win32.Backdoor.Farfli
Status:
Malicious
First seen:
2022-05-28 13:55:22 UTC
File Type:
PE (Exe)
Extracted files:
21
AV detection:
15 of 26 (57.69%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
unknown
Similar samples:
+ 16 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
10/10
Tags:
evasion persistence spyware stealer trojan upx
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
System policy modification
Views/modifies file attributes
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Adds Run key to start application
Checks whether UAC is enabled
Enumerates connected drives
Checks BIOS information in registry
Checks computer location settings
Identifies Wine through registry keys
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Modifies Windows Firewall
Sets file to hidden
UPX packed file
Identifies VirtualBox via ACPI registry values (likely anti-VM)
UAC bypass
Unpacked files
SH256 hash:
4bf743f2e0b30d5f70e73fc3553fe58e2fc8f2c801049de7039a9b29cd381826
MD5 hash:
c4dadf6ff35c7a3b5ebe47a6c2bac9ea
SHA1 hash:
12b44f4b228576409171abb66bfb119c3e8c6b60
SH256 hash:
55afec20feec6d827e210ddf325655d4e580cb63964d94fe58edbfee4eae4111
MD5 hash:
ecc8d86bf4d96a38eb41ae50fc71e67a
SHA1 hash:
45b827212e8a04b6e89c041b3e570c61dd1b3305
SH256 hash:
131b5f5e179e8e4ef4252616e0372184db70bc3a5095ae7902698ec2095048ef
MD5 hash:
2d2ae412ba2048089cdd0864b79b7f8c
SHA1 hash:
19a4878e62b4b5ba860166d106c5c8a45e4e2055
SH256 hash:
02ce69a49442f00cf1cced9968fbeb5e645801efe7c19ab1362fdde14cb0c471
MD5 hash:
1d1b29a06415705a56ed2eebd4a3ecbe
SHA1 hash:
4cfaf4a806238d62a92b5b24ea5093c91d2dfe9a
SH256 hash:
61d451ce5a169591bd4e8633c9030a8afb54027e66dbae6127984caa48bc2568
MD5 hash:
7586a115a915c813f58059386db4f9ce
SHA1 hash:
9fb24eaef2da9aa81f5cc90217092b09040421ff
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.