MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 9b2a630e6d367fb9d1fe122c6dbc3859c65bde3e2a2a6be653a23d364911f1fa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Mimic
Vendor detections: 17
| SHA256 hash: | 9b2a630e6d367fb9d1fe122c6dbc3859c65bde3e2a2a6be653a23d364911f1fa |
|---|---|
| SHA3-384 hash: | 64966e105a221d4f04c8b014fcc6460804bdadea0ef47a19fa9b623c59959c7bcbf88b3df91fd3ecc3e32b2f8087b552 |
| SHA1 hash: | da5bb7118fad2cb3cd67510acb5ea9b71ae473c3 |
| MD5 hash: | 7fbca6b3634d3cf57195606526e27b46 |
| humanhash: | failed-october-virginia-oven |
| File name: | file |
| Download: | download sample |
| Signature | Mimic |
| File size: | 2'342'266 bytes |
| First seen: | 2026-01-15 16:23:06 UTC |
| Last seen: | 2026-01-15 17:36:27 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f6baa5eaa8231d4fe8e922a2e6d240ea (61 x CoinMiner, 22 x DCRat, 15 x LummaStealer) |
| ssdeep | 49152:IgwR4njORGEqBKfI18DXc5WDAky+AKkw0QOfat9OojItG:IgwR4nB/HCDIWDRYKkdQOu9QtG |
| Threatray | 22 similar samples on MalwareBazaar |
| TLSH | T1E4B53382BBE1CDB8F6C211361545B5A12ADDF2B01FC049CF6B5C06055BB1AE4CAFA39D |
| TrID | 38.7% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 24.6% (.EXE) Win64 Executable (generic) (10522/11/4) 11.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 10.5% (.EXE) Win32 Executable (generic) (4504/4/1) 4.7% (.EXE) OS/2 Executable (generic) (2029/13) |
| Magika | pebin |
| Reporter | |
| Tags: | c dropped-by-gcleaner exe Mimic MIX9.file |
Intelligence
File Origin
# of uploads :
2
# of downloads :
146
Origin country :
USVendor Threat Intelligence
Malware configuration found for:
Archives
Details
Archives
extracted archive contents
Archives
an extracted 7-zip archive from the overlay data and SFX commands
Malware family:
n/a
ID:
1
File name:
_9b2a630e6d367fb9d1fe122c6dbc3859c65bde3e2a2a6be653a23d364911f1fa.exe
Verdict:
Malicious activity
Analysis date:
2026-01-15 16:24:10 UTC
Tags:
auto-reg everything tool auto generic smb ransomware
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Verdict:
Malicious
Score:
70%
Tags:
injection
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
adaptive-context fingerprint installer installer keylogger masquerade microsoft_visual_cc obfuscated overlay overlay pay2key ransomware
Verdict:
Malicious
Labled as:
Win/grayware_confidence_90%
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-01-15T13:40:00Z UTC
Last seen:
2026-01-17T08:03:00Z UTC
Hits:
~10
Detections:
Trojan-Ransom.Win32.Mimic.sb Trojan-Ransom.Win32.Agent.sb Trojan.Win32.Agent.sb Trojan.PowerShell.Cobalt.sb HEUR:Trojan-Ransom.Win32.Generic HEUR:HackTool.Win64.NoDefender.a BSS:HackTool.Win32.Yzon.a Trojan.PowerShell.Kriptik.sba
Malware family:
Mimic Ransomware
Verdict:
Malicious
Score:
89%
Verdict:
Malware
File Type:
PE
Gathering data
Verdict:
Malicious
Threat:
HackTool.Win32.Mimic
Threat name:
Win32.Ransomware.Pay2Key
Status:
Suspicious
First seen:
2026-01-15 16:23:31 UTC
File Type:
PE (Exe)
Extracted files:
14
AV detection:
13 of 24 (54.17%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
hacktool_defendernot
Similar samples:
+ 12 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
7/10
Tags:
discovery execution upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
UPX packed file
Command and Scripting Interpreter: PowerShell
Checks computer location settings
Executes dropped EXE
Verdict:
Malicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
9b2a630e6d367fb9d1fe122c6dbc3859c65bde3e2a2a6be653a23d364911f1fa
MD5 hash:
7fbca6b3634d3cf57195606526e27b46
SHA1 hash:
da5bb7118fad2cb3cd67510acb5ea9b71ae473c3
SH256 hash:
e37aa72bca3cecb9bdbe51cbd81ec1143bb17163088a1379a4ccb93f5d881e76
MD5 hash:
5cac4fe734fc8454ccb847e030beee38
SHA1 hash:
34298fe220e35f614b2c837cf1dc2604ab0882d6
SH256 hash:
ad80064f71d273967dcf0b14b9cd6e84d79a132231d619687d9266c7807bdfe0
MD5 hash:
a35ee23aaab26afc575ac83df9572b57
SHA1 hash:
81ea38c694ce9702faddfb961f17c1bbf628a76d
SH256 hash:
00b9c0120df0595184523a3620ef9b3c3e11fc0e61d366d7eeabb646647cfceb
MD5 hash:
bd1f243ee2140f2f6118a7754ea02a63
SHA1 hash:
cdf7dd7dd1771edcc473037af80afd7e449e30d9
SH256 hash:
0377585ec50ed2e1b3d8519be272599f31024accd20b484ddae8240e09cc83b4
MD5 hash:
13d3997b43c3d5cbafb0ff10b6f0dee1
SHA1 hash:
e650a76f3fa8d28e2ff3751ccf44d124ef2b82bd
SH256 hash:
0e733e347b0b6337923715e5b1cbf67d634943f2c04181cf7016d76c42e6732f
MD5 hash:
f89081eafff0505205020e6315a2c5c5
SHA1 hash:
023f4c8de851000cedd27b33ad4aee6ca81e729d
Detections:
INDICATOR_SUSPICIOUS_GENRansomware
INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM
INDICATOR_SUSPICIOUS_ClearWinLogs
INDICATOR_SUSPICIOUS_USNDeleteJournal
SH256 hash:
135752700c2df1695db7968de9c53502c32c15f14624e6344b51940d5b951475
MD5 hash:
93e954839aefb3010968a42ff798a8f1
SHA1 hash:
fc769175ce13539527ec97f6b90b73a18c57870c
SH256 hash:
d8e42139b3278327127dac96d28a9552db5eab2cca7f0c4b3f27206ca699a149
MD5 hash:
7806b71abf95eba62f0a89b573854a22
SHA1 hash:
3e96eb44b3e28bc151d5d7d0a1bc5936bcad0380
SH256 hash:
9a2c5798ec17536572a446fc084daf7c9aeab62585925c9bc0a50d58adf42a4c
MD5 hash:
2d429a9ffe6d8dd6c9d6591e33345652
SHA1 hash:
8bdeb43e7478e00f71c34494440b308558c55db8
SH256 hash:
635ed49d17daa3ab625bda439fd4bfc1e340cdf23b1c95ff1dc68ecaff3ce4ee
MD5 hash:
0cbac07c8e2508850626f515222a64d8
SHA1 hash:
228129069dadbe16ebdd1a2be4181394f82f3191
SH256 hash:
7c165c44ee5fef4952f285635c9e00ad58aa4c4669ca9ab6d9157ef79bdf351a
MD5 hash:
3ec24b622eaf0b94eda09673081dd7a8
SHA1 hash:
0ad1e5680cc5fb3d2d4bb23e1c8277cc447391d5
SH256 hash:
ee9fa714d1cd8322fd1d9534d3baa121b436d5c589bad8c40ff28e6ab2e2166d
MD5 hash:
182498eca7b0fb4b00b375b715805a40
SHA1 hash:
18ff550f47ac37af99c5771ddb79f9b9d0608d93
SH256 hash:
f457b1cb1b146ab07117e34dc50881ef787946a0311467d82469fdaa3e54884c
MD5 hash:
52b7073101ce2f83c85ed698f1ee0445
SHA1 hash:
cd2f016c79de7d4bf20d1366cc9483b610b4ffc2
SH256 hash:
ba2313bbf61167e3d394dc19cafb5a17d120771dc0c220aa54c3c9f489fd14a4
MD5 hash:
883d6a09e394f937dfad3eb5dd12e8b8
SHA1 hash:
a3dc445546da91aecb5a4aae0947e8cb9f179fe0
SH256 hash:
49f23f83807913b84917cfdb800ac04d905fdc844f4b41b6aaf894506864355b
MD5 hash:
0faecd43382ab6f35d8b2be61939377e
SHA1 hash:
c6295657d52bc5dc16fa2542be23dac7948fa400
Malware family:
Mimic
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Dropped by
Gcleaner
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.