MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9b2a630e6d367fb9d1fe122c6dbc3859c65bde3e2a2a6be653a23d364911f1fa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mimic


Vendor detections: 17


Intelligence 17 IOCs YARA File information Comments

SHA256 hash: 9b2a630e6d367fb9d1fe122c6dbc3859c65bde3e2a2a6be653a23d364911f1fa
SHA3-384 hash: 64966e105a221d4f04c8b014fcc6460804bdadea0ef47a19fa9b623c59959c7bcbf88b3df91fd3ecc3e32b2f8087b552
SHA1 hash: da5bb7118fad2cb3cd67510acb5ea9b71ae473c3
MD5 hash: 7fbca6b3634d3cf57195606526e27b46
humanhash: failed-october-virginia-oven
File name:file
Download: download sample
Signature Mimic
File size:2'342'266 bytes
First seen:2026-01-15 16:23:06 UTC
Last seen:2026-01-15 17:36:27 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f6baa5eaa8231d4fe8e922a2e6d240ea (61 x CoinMiner, 22 x DCRat, 15 x LummaStealer)
ssdeep 49152:IgwR4njORGEqBKfI18DXc5WDAky+AKkw0QOfat9OojItG:IgwR4nB/HCDIWDRYKkdQOu9QtG
Threatray 22 similar samples on MalwareBazaar
TLSH T1E4B53382BBE1CDB8F6C211361545B5A12ADDF2B01FC049CF6B5C06055BB1AE4CAFA39D
TrID 38.7% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
24.6% (.EXE) Win64 Executable (generic) (10522/11/4)
11.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.5% (.EXE) Win32 Executable (generic) (4504/4/1)
4.7% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
Reporter Bitsight
Tags:c dropped-by-gcleaner exe Mimic MIX9.file


Avatar
Bitsight
url: http://194.38.20.224/service

Intelligence


File Origin
# of uploads :
2
# of downloads :
146
Origin country :
US US
Vendor Threat Intelligence
Malware configuration found for:
Archives
Details
Archives
extracted archive contents
Archives
an extracted 7-zip archive from the overlay data and SFX commands
Malware family:
n/a
ID:
1
File name:
_9b2a630e6d367fb9d1fe122c6dbc3859c65bde3e2a2a6be653a23d364911f1fa.exe
Verdict:
Malicious activity
Analysis date:
2026-01-15 16:24:10 UTC
Tags:
auto-reg everything tool auto generic smb ransomware

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
70%
Tags:
injection
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context fingerprint installer installer keylogger masquerade microsoft_visual_cc obfuscated overlay overlay pay2key ransomware
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-01-15T13:40:00Z UTC
Last seen:
2026-01-17T08:03:00Z UTC
Hits:
~10
Detections:
Trojan-Ransom.Win32.Mimic.sb Trojan-Ransom.Win32.Agent.sb Trojan.Win32.Agent.sb Trojan.PowerShell.Cobalt.sb HEUR:Trojan-Ransom.Win32.Generic HEUR:HackTool.Win64.NoDefender.a BSS:HackTool.Win32.Yzon.a Trojan.PowerShell.Kriptik.sba
Malware family:
Mimic Ransomware
Verdict:
Malicious
Gathering data
Threat name:
Win32.Ransomware.Pay2Key
Status:
Suspicious
First seen:
2026-01-15 16:23:31 UTC
File Type:
PE (Exe)
Extracted files:
14
AV detection:
13 of 24 (54.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery execution upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
UPX packed file
Command and Scripting Interpreter: PowerShell
Checks computer location settings
Executes dropped EXE
Unpacked files
SH256 hash:
9b2a630e6d367fb9d1fe122c6dbc3859c65bde3e2a2a6be653a23d364911f1fa
MD5 hash:
7fbca6b3634d3cf57195606526e27b46
SHA1 hash:
da5bb7118fad2cb3cd67510acb5ea9b71ae473c3
SH256 hash:
e37aa72bca3cecb9bdbe51cbd81ec1143bb17163088a1379a4ccb93f5d881e76
MD5 hash:
5cac4fe734fc8454ccb847e030beee38
SHA1 hash:
34298fe220e35f614b2c837cf1dc2604ab0882d6
SH256 hash:
ad80064f71d273967dcf0b14b9cd6e84d79a132231d619687d9266c7807bdfe0
MD5 hash:
a35ee23aaab26afc575ac83df9572b57
SHA1 hash:
81ea38c694ce9702faddfb961f17c1bbf628a76d
SH256 hash:
00b9c0120df0595184523a3620ef9b3c3e11fc0e61d366d7eeabb646647cfceb
MD5 hash:
bd1f243ee2140f2f6118a7754ea02a63
SHA1 hash:
cdf7dd7dd1771edcc473037af80afd7e449e30d9
SH256 hash:
0377585ec50ed2e1b3d8519be272599f31024accd20b484ddae8240e09cc83b4
MD5 hash:
13d3997b43c3d5cbafb0ff10b6f0dee1
SHA1 hash:
e650a76f3fa8d28e2ff3751ccf44d124ef2b82bd
SH256 hash:
0e733e347b0b6337923715e5b1cbf67d634943f2c04181cf7016d76c42e6732f
MD5 hash:
f89081eafff0505205020e6315a2c5c5
SHA1 hash:
023f4c8de851000cedd27b33ad4aee6ca81e729d
Detections:
INDICATOR_SUSPICIOUS_GENRansomware INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM INDICATOR_SUSPICIOUS_ClearWinLogs INDICATOR_SUSPICIOUS_USNDeleteJournal
SH256 hash:
135752700c2df1695db7968de9c53502c32c15f14624e6344b51940d5b951475
MD5 hash:
93e954839aefb3010968a42ff798a8f1
SHA1 hash:
fc769175ce13539527ec97f6b90b73a18c57870c
SH256 hash:
d8e42139b3278327127dac96d28a9552db5eab2cca7f0c4b3f27206ca699a149
MD5 hash:
7806b71abf95eba62f0a89b573854a22
SHA1 hash:
3e96eb44b3e28bc151d5d7d0a1bc5936bcad0380
SH256 hash:
9a2c5798ec17536572a446fc084daf7c9aeab62585925c9bc0a50d58adf42a4c
MD5 hash:
2d429a9ffe6d8dd6c9d6591e33345652
SHA1 hash:
8bdeb43e7478e00f71c34494440b308558c55db8
SH256 hash:
635ed49d17daa3ab625bda439fd4bfc1e340cdf23b1c95ff1dc68ecaff3ce4ee
MD5 hash:
0cbac07c8e2508850626f515222a64d8
SHA1 hash:
228129069dadbe16ebdd1a2be4181394f82f3191
SH256 hash:
7c165c44ee5fef4952f285635c9e00ad58aa4c4669ca9ab6d9157ef79bdf351a
MD5 hash:
3ec24b622eaf0b94eda09673081dd7a8
SHA1 hash:
0ad1e5680cc5fb3d2d4bb23e1c8277cc447391d5
SH256 hash:
ee9fa714d1cd8322fd1d9534d3baa121b436d5c589bad8c40ff28e6ab2e2166d
MD5 hash:
182498eca7b0fb4b00b375b715805a40
SHA1 hash:
18ff550f47ac37af99c5771ddb79f9b9d0608d93
SH256 hash:
f457b1cb1b146ab07117e34dc50881ef787946a0311467d82469fdaa3e54884c
MD5 hash:
52b7073101ce2f83c85ed698f1ee0445
SHA1 hash:
cd2f016c79de7d4bf20d1366cc9483b610b4ffc2
SH256 hash:
ba2313bbf61167e3d394dc19cafb5a17d120771dc0c220aa54c3c9f489fd14a4
MD5 hash:
883d6a09e394f937dfad3eb5dd12e8b8
SHA1 hash:
a3dc445546da91aecb5a4aae0947e8cb9f179fe0
SH256 hash:
49f23f83807913b84917cfdb800ac04d905fdc844f4b41b6aaf894506864355b
MD5 hash:
0faecd43382ab6f35d8b2be61939377e
SHA1 hash:
c6295657d52bc5dc16fa2542be23dac7948fa400
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mimic

Executable exe 9b2a630e6d367fb9d1fe122c6dbc3859c65bde3e2a2a6be653a23d364911f1fa

(this sample)

  
Dropped by
Gcleaner
  
Delivery method
Distributed via web download

Comments