MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 9f6a696876fee8b811db8889bf4933262f4472ad41daea215d2e39bd537cf32f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Mimic
Vendor detections: 17
| SHA256 hash: | 9f6a696876fee8b811db8889bf4933262f4472ad41daea215d2e39bd537cf32f |
|---|---|
| SHA3-384 hash: | d7d32e8d63676886879acd210fec6da2290c09e58a87a884f70061069732dbe10cfa4ace859c4633e574b5d6ebd6adc2 |
| SHA1 hash: | 61f73e692e9549ad8bc9b965e25d2da683d56dc1 |
| MD5 hash: | 33eeeb25f834e0b180f960ecb9518ea0 |
| humanhash: | connecticut-cola-two-alpha |
| File name: | 9f6a696876fee8b811db8889bf4933262f4472ad41daea215d2e39bd537cf32f |
| Download: | download sample |
| Signature | Mimic |
| File size: | 3'729'943 bytes |
| First seen: | 2024-10-31 11:53:43 UTC |
| Last seen: | 2024-12-15 07:40:21 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f6baa5eaa8231d4fe8e922a2e6d240ea (61 x CoinMiner, 22 x DCRat, 15 x LummaStealer) |
| ssdeep | 98304:ngwRMbvguPPou2Bzg1jGE5FS3E/HrmP9Aji:ng/bv25jEKU/HrmP9AO |
| Threatray | 12 similar samples on MalwareBazaar |
| TLSH | T12E06338333D2CE72F08A0AF39A2866B355F0B7180B3B61C7DB10661557376EA917E794 |
| TrID | 38.7% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 24.6% (.EXE) Win64 Executable (generic) (10522/11/4) 11.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 10.5% (.EXE) Win32 Executable (generic) (4504/4/1) 4.7% (.EXE) OS/2 Executable (generic) (2029/13) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | b2b2ccd4d496b2b2 (1 x Mimic) |
| Reporter | |
| Tags: | 7183204373585782 Elpaco exe Mimic |
Intelligence
File Origin
# of uploads :
2
# of downloads :
417
Origin country :
ITVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
9f6a696876fee8b811db8889bf4933262f4472ad41daea215d2e39bd537cf32f
Verdict:
Malicious activity
Analysis date:
2024-10-31 12:00:30 UTC
Tags:
xor-url generic mimic ransomware confuser
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
powershell autoit emotet
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file
Searching for the window
Running batch commands
Searching for synchronization primitives
Connection attempt
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun with the shell\open\command registry branches
Unauthorized injection to a recently created process
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
fingerprint installer keylogger microsoft_visual_cc overlay packed packed packer_detected rijndael
Verdict:
Malicious
Labled as:
Trojan.Generic
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Mimic Ransomware
Verdict:
Malicious
Result
Threat name:
BTC, Mimic
Detection:
malicious
Classification:
rans.spyw.expl.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Contains functionality to register a low level keyboard hook
Creates a Image File Execution Options (IFEO) Debugger entry
Creates an undocumented autostart registry key
Detected unpacking (changes PE section rights)
Disable UAC(promptonsecuredesktop)
Disables UAC (registry)
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Modifies Group Policy settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Potentially malicious time measurement code found
Writes a notice file (html or txt) to demand a ransom
Yara detected BTC ransomware
Yara detected Mimic Ransomware
Yara detected RansomwareGeneric18
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
Score:
98%
Verdict:
Malware
File Type:
PE
Threat name:
Win32.Ransomware.Mimic
Status:
Malicious
First seen:
2024-07-12 02:36:37 UTC
File Type:
PE (Exe)
Extracted files:
40
AV detection:
20 of 38 (52.63%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
mimicransomware
admintool_powerrun
Similar samples:
+ 2 additional samples on MalwareBazaar
Result
Malware family:
mimic
Score:
10/10
Tags:
family:mimic discovery evasion persistence ransomware
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Adds Run key to start application
Enumerates connected drives
Checks computer location settings
Deletes itself
Executes dropped EXE
Loads dropped DLL
Modifies system executable filetype association
Clears Windows event logs
Detects Mimic ransomware
Mimic
Mimic family
Verdict:
Malicious
Tags:
mimic_ransomware
YARA:
n/a
Unpacked files
SH256 hash:
9028b077bf6ec87ecc614259eff13a3d59d11a8e5f99839787f5afbad07c7d98
MD5 hash:
d8ec0b4f9cd228da7d321c654bac586c
SHA1 hash:
807c1ab067f6b9c414e4e831c2ceed525f651f09
Detections:
INDICATOR_EXE_Packed_ConfuserEx
SH256 hash:
36ea4fb3f5f6d7887402b3886bd1b34dbf27fcdf8a40ba33572ad5bd0a11b0a2
MD5 hash:
50f4d37192ca64e4fa902fb0c0917e82
SHA1 hash:
6ff3047fbc36221d96307bf800ed2abf8e845834
SH256 hash:
e160d7d21c917344f010e58dcfc1e19bec6297c294647a06ce60efc7420d3b13
MD5 hash:
b951e50264f9c5244592dfb0a859ec41
SHA1 hash:
8af05099986d0b105d8e38f305efe9098a9fbda6
Detections:
Detect_Mimic_Ransomware
INDICATOR_SUSPICIOUS_ClearWinLogs
INDICATOR_SUSPICIOUS_GENRansomware
INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM
INDICATOR_SUSPICIOUS_USNDeleteJournal
SH256 hash:
f0d91873f4433ab2076d2584dff51c3710046508874a26f9104d079c7b72a9f5
MD5 hash:
5ae7fb7ce1571ec10862d9ea19ded810
SHA1 hash:
77c7bc9d43cce5a70c03ee48980ef5e20f66046b
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24
INDICATOR_EXE_Packed_ConfuserEx
SH256 hash:
842020a9434fc38544210e8d611fd348c374bc5751d17835524c56d946fa5143
MD5 hash:
bfae9c4cbd91a42e3e85e9c193552446
SHA1 hash:
3d33a004dfb508aa0a20bbdb23d2c08b59173ccc
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24
INDICATOR_EXE_Packed_ConfuserEx
SH256 hash:
5f936dfd0a2e3457ccfa680ae0fe7427d9a30190ddbcba0a04a1e188602c1073
MD5 hash:
cd28f25091fb6aeac326dffac5296f20
SHA1 hash:
201560dc07373a1c7b9e25b41d92473849adea27
Detections:
Detect_Mimic_Ransomware
INDICATOR_SUSPICIOUS_ClearWinLogs
INDICATOR_SUSPICIOUS_GENRansomware
INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM
INDICATOR_SUSPICIOUS_USNDeleteJournal
SH256 hash:
faf8ee932a3c5970f91827f6a5291fc1bbf314d522591b5b1548e2735acc4481
MD5 hash:
756dee925cb33ffecf69672401db3390
SHA1 hash:
124da3ebae8adc2b6c4ae94ec2605ca14c8fe76a
Detections:
AutoIT_Compiled
INDICATOR_TOOL_PET_DefenderControl
SH256 hash:
91059b88b1ef536836dd70853c7de88639f5220fe0438416a72cee7d86ecd871
MD5 hash:
a7d38b39dc40fd2f545c49e8f02bcc31
SHA1 hash:
dab67f863986a2532a296d7a2649612121b371a3
SH256 hash:
124e7a5b74b4c213fcf7115b98b382c98ad9a46c4f04b4a273b2a58c644dffd8
MD5 hash:
6d1eaaef5e00b3151d1d757093a22201
SHA1 hash:
5af79717807a0542ae53d0e2924524a84c8f743d
SH256 hash:
6e2f349d5b68b7f1c480f6535b4afdb185dc181746d52d260df17ffdfd6e6958
MD5 hash:
b6347f7f6458aba15820bb4fad715827
SHA1 hash:
43089784f8ad2b59d71c090c6fb950151ff88838
SH256 hash:
092e3d22d06a9b05486d44c5f6a9f80a59f5e028b88f273b7d64413a0713cfc0
MD5 hash:
fa83b540d172231014bd984484b695d4
SHA1 hash:
1e60b1fba16fe35d23e0131530992eade9a992e3
SH256 hash:
4b2a7ab74f2ad0c351d30ae856dcadc048f08a118e66ef465e02837ce61f9536
MD5 hash:
2cf873703f3b519c51584775eeecc9d2
SHA1 hash:
ee501bc6b8c53bea697547877ec7d96c132e5c56
SH256 hash:
9dc17242f1db11e98abe583a838e5f33b078038f1b3ed745a30d18c8017f1c0c
MD5 hash:
cd66aef6a4f52cb6132a74866f59fa37
SHA1 hash:
683820145480834294b7b63f3b153b954751ee37
SH256 hash:
9f6a696876fee8b811db8889bf4933262f4472ad41daea215d2e39bd537cf32f
MD5 hash:
33eeeb25f834e0b180f960ecb9518ea0
SHA1 hash:
61f73e692e9549ad8bc9b965e25d2da683d56dc1
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
No further information available
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
| CHECK_TRUST_INFO | Requires Elevated Execution (uiAccess:None) | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| AUTH_API | Manipulates User Authorization | ADVAPI32.dll::AllocateAndInitializeSid ADVAPI32.dll::FreeSid |
| COM_BASE_API | Can Download & Execute components | ole32.dll::CoCreateInstance ole32.dll::CreateStreamOnHGlobal |
| SECURITY_BASE_API | Uses Security Base API | ADVAPI32.dll::CheckTokenMembership |
| SHELL_API | Manipulates System Shell | SHELL32.dll::ShellExecuteW SHELL32.dll::ShellExecuteExW SHELL32.dll::SHGetFileInfoW |
| WIN32_PROCESS_API | Can Create Process and Threads | KERNEL32.dll::CreateProcessW KERNEL32.dll::CloseHandle KERNEL32.dll::CreateThread |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::LoadLibraryA KERNEL32.dll::GetDriveTypeW KERNEL32.dll::GetStartupInfoW KERNEL32.dll::GetStartupInfoA KERNEL32.dll::GetDiskFreeSpaceExW KERNEL32.dll::GetCommandLineW |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::AssignProcessToJobObject |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CreateDirectoryW KERNEL32.dll::CreateFileW KERNEL32.dll::DeleteFileW KERNEL32.dll::GetSystemDirectoryW KERNEL32.dll::GetFileAttributesW KERNEL32.dll::FindFirstFileW |
| WIN_USER_API | Performs GUI Actions | USER32.dll::CreateWindowExA USER32.dll::CreateWindowExW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.