MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9f6a696876fee8b811db8889bf4933262f4472ad41daea215d2e39bd537cf32f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mimic


Vendor detections: 17


Intelligence 17 IOCs YARA File information Comments

SHA256 hash: 9f6a696876fee8b811db8889bf4933262f4472ad41daea215d2e39bd537cf32f
SHA3-384 hash: d7d32e8d63676886879acd210fec6da2290c09e58a87a884f70061069732dbe10cfa4ace859c4633e574b5d6ebd6adc2
SHA1 hash: 61f73e692e9549ad8bc9b965e25d2da683d56dc1
MD5 hash: 33eeeb25f834e0b180f960ecb9518ea0
humanhash: connecticut-cola-two-alpha
File name:9f6a696876fee8b811db8889bf4933262f4472ad41daea215d2e39bd537cf32f
Download: download sample
Signature Mimic
File size:3'729'943 bytes
First seen:2024-10-31 11:53:43 UTC
Last seen:2024-12-15 07:40:21 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f6baa5eaa8231d4fe8e922a2e6d240ea (61 x CoinMiner, 22 x DCRat, 15 x LummaStealer)
ssdeep 98304:ngwRMbvguPPou2Bzg1jGE5FS3E/HrmP9Aji:ng/bv25jEKU/HrmP9AO
Threatray 12 similar samples on MalwareBazaar
TLSH T12E06338333D2CE72F08A0AF39A2866B355F0B7180B3B61C7DB10661557376EA917E794
TrID 38.7% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
24.6% (.EXE) Win64 Executable (generic) (10522/11/4)
11.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.5% (.EXE) Win32 Executable (generic) (4504/4/1)
4.7% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
File icon (PE):PE icon
dhash icon b2b2ccd4d496b2b2 (1 x Mimic)
Reporter JAMESWT_WT
Tags:7183204373585782 Elpaco exe Mimic

Intelligence


File Origin
# of uploads :
2
# of downloads :
417
Origin country :
IT IT
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
9f6a696876fee8b811db8889bf4933262f4472ad41daea215d2e39bd537cf32f
Verdict:
Malicious activity
Analysis date:
2024-10-31 12:00:30 UTC
Tags:
xor-url generic mimic ransomware confuser

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
powershell autoit emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file
Searching for the window
Running batch commands
Searching for synchronization primitives
Connection attempt
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun with the shell\open\command registry branches
Unauthorized injection to a recently created process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
fingerprint installer keylogger microsoft_visual_cc overlay packed packed packer_detected rijndael
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Mimic Ransomware
Verdict:
Malicious
Result
Threat name:
BTC, Mimic
Detection:
malicious
Classification:
rans.spyw.expl.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Contains functionality to register a low level keyboard hook
Creates a Image File Execution Options (IFEO) Debugger entry
Creates an undocumented autostart registry key
Detected unpacking (changes PE section rights)
Disable UAC(promptonsecuredesktop)
Disables UAC (registry)
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Modifies Group Policy settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Potentially malicious time measurement code found
Writes a notice file (html or txt) to demand a ransom
Yara detected BTC ransomware
Yara detected Mimic Ransomware
Yara detected RansomwareGeneric18
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1546057 Sample: fmy0zfRjSB.exe Startdate: 31/10/2024 Architecture: WINDOWS Score: 100 118 Malicious sample detected (through community Yara rule) 2->118 120 Antivirus detection for dropped file 2->120 122 Antivirus / Scanner detection for submitted sample 2->122 124 9 other signatures 2->124 14 fmy0zfRjSB.exe 8 2->14         started        18 svhostss.exe 2->18         started        20 svhostss.exe 2->20         started        process3 file4 108 C:\Users\user\AppData\...verything32.dll, PE32 14->108 dropped 110 C:\Users\user\AppData\...verything.exe, PE32 14->110 dropped 112 C:\Users\user\AppData\Local\Temp\...\7za.exe, PE32 14->112 dropped 146 Contains functionality to register a low level keyboard hook 14->146 22 ELPACO-team.exe 2 16 14->22         started        26 7za.exe 10 14->26         started        28 cmd.exe 1 14->28         started        30 7za.exe 1 14->30         started        114 C:\Users\user\AppData\...\Decryption_INFO.txt, ASCII 18->114 dropped 116 C:\Decryption_INFO.txt, ASCII 18->116 dropped 148 Connects to many different private IPs via SMB (likely to spread or exploit) 18->148 150 Connects to many different private IPs (likely to spread or exploit) 18->150 152 Creates an undocumented autostart registry key 18->152 154 3 other signatures 18->154 32 cmd.exe 18->32         started        34 svhostss.exe 18->34         started        36 svhostss.exe 18->36         started        40 2 other processes 18->40 38 conhost.exe 20->38         started        signatures5 process6 file7 90 C:\Users\user\AppData\Local\...\svhostss.exe, PE32 22->90 dropped 92 C:\Users\user\AppData\Local\...\gui40.exe, PE32 22->92 dropped 94 C:\Users\user\AppData\Local\...\gui35.exe, PE32 22->94 dropped 102 6 other files (5 malicious) 22->102 dropped 126 Multi AV Scanner detection for dropped file 22->126 128 Creates an undocumented autostart registry key 22->128 130 Machine Learning detection for dropped file 22->130 132 Potentially malicious time measurement code found 22->132 42 svhostss.exe 1 22->42         started        45 conhost.exe 22->45         started        96 C:\Users\user\AppData\Local\...\gui40.exe, PE32 26->96 dropped 98 C:\Users\user\AppData\Local\...\gui35.exe, PE32 26->98 dropped 100 ENC_default_defaul...ram@datadecrypt.exe, PE32 26->100 dropped 104 3 other files (2 malicious) 26->104 dropped 47 conhost.exe 26->47         started        49 conhost.exe 28->49         started        51 conhost.exe 30->51         started        59 2 other processes 32->59 53 conhost.exe 34->53         started        55 conhost.exe 36->55         started        57 conhost.exe 40->57         started        signatures8 process9 file10 134 Multi AV Scanner detection for dropped file 42->134 136 Machine Learning detection for dropped file 42->136 138 Writes a notice file (html or txt) to demand a ransom 42->138 140 Potentially malicious time measurement code found 42->140 62 svhostss.exe 1 42->62         started        64 conhost.exe 42->64         started        106 C:\Windows\System32behaviorgraphroupPolicy\gpt.ini, ASCII 59->106 dropped 142 Allocates memory in foreign processes 59->142 144 Modifies Group Policy settings 59->144 66 DC.exe 59->66         started        signatures11 process12 process13 68 svhostss.exe 1 62->68         started        70 conhost.exe 62->70         started        process14 72 svhostss.exe 1 68->72         started        74 conhost.exe 68->74         started        process15 76 svhostss.exe 1 72->76         started        78 conhost.exe 72->78         started        process16 80 svhostss.exe 1 76->80         started        82 conhost.exe 76->82         started        process17 84 svhostss.exe 1 80->84         started        86 conhost.exe 80->86         started        process18 88 conhost.exe 84->88         started       
Threat name:
Win32.Ransomware.Mimic
Status:
Malicious
First seen:
2024-07-12 02:36:37 UTC
File Type:
PE (Exe)
Extracted files:
40
AV detection:
20 of 38 (52.63%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mimic discovery evasion persistence ransomware
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Adds Run key to start application
Enumerates connected drives
Checks computer location settings
Deletes itself
Executes dropped EXE
Loads dropped DLL
Modifies system executable filetype association
Clears Windows event logs
Detects Mimic ransomware
Mimic
Mimic family
Verdict:
Malicious
Tags:
mimic_ransomware
YARA:
n/a
Unpacked files
SH256 hash:
9028b077bf6ec87ecc614259eff13a3d59d11a8e5f99839787f5afbad07c7d98
MD5 hash:
d8ec0b4f9cd228da7d321c654bac586c
SHA1 hash:
807c1ab067f6b9c414e4e831c2ceed525f651f09
Detections:
INDICATOR_EXE_Packed_ConfuserEx
SH256 hash:
36ea4fb3f5f6d7887402b3886bd1b34dbf27fcdf8a40ba33572ad5bd0a11b0a2
MD5 hash:
50f4d37192ca64e4fa902fb0c0917e82
SHA1 hash:
6ff3047fbc36221d96307bf800ed2abf8e845834
SH256 hash:
e160d7d21c917344f010e58dcfc1e19bec6297c294647a06ce60efc7420d3b13
MD5 hash:
b951e50264f9c5244592dfb0a859ec41
SHA1 hash:
8af05099986d0b105d8e38f305efe9098a9fbda6
Detections:
Detect_Mimic_Ransomware INDICATOR_SUSPICIOUS_ClearWinLogs INDICATOR_SUSPICIOUS_GENRansomware INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM INDICATOR_SUSPICIOUS_USNDeleteJournal
SH256 hash:
f0d91873f4433ab2076d2584dff51c3710046508874a26f9104d079c7b72a9f5
MD5 hash:
5ae7fb7ce1571ec10862d9ea19ded810
SHA1 hash:
77c7bc9d43cce5a70c03ee48980ef5e20f66046b
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 INDICATOR_EXE_Packed_ConfuserEx
SH256 hash:
842020a9434fc38544210e8d611fd348c374bc5751d17835524c56d946fa5143
MD5 hash:
bfae9c4cbd91a42e3e85e9c193552446
SHA1 hash:
3d33a004dfb508aa0a20bbdb23d2c08b59173ccc
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 INDICATOR_EXE_Packed_ConfuserEx
SH256 hash:
5f936dfd0a2e3457ccfa680ae0fe7427d9a30190ddbcba0a04a1e188602c1073
MD5 hash:
cd28f25091fb6aeac326dffac5296f20
SHA1 hash:
201560dc07373a1c7b9e25b41d92473849adea27
Detections:
Detect_Mimic_Ransomware INDICATOR_SUSPICIOUS_ClearWinLogs INDICATOR_SUSPICIOUS_GENRansomware INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM INDICATOR_SUSPICIOUS_USNDeleteJournal
SH256 hash:
faf8ee932a3c5970f91827f6a5291fc1bbf314d522591b5b1548e2735acc4481
MD5 hash:
756dee925cb33ffecf69672401db3390
SHA1 hash:
124da3ebae8adc2b6c4ae94ec2605ca14c8fe76a
Detections:
AutoIT_Compiled INDICATOR_TOOL_PET_DefenderControl
SH256 hash:
91059b88b1ef536836dd70853c7de88639f5220fe0438416a72cee7d86ecd871
MD5 hash:
a7d38b39dc40fd2f545c49e8f02bcc31
SHA1 hash:
dab67f863986a2532a296d7a2649612121b371a3
SH256 hash:
124e7a5b74b4c213fcf7115b98b382c98ad9a46c4f04b4a273b2a58c644dffd8
MD5 hash:
6d1eaaef5e00b3151d1d757093a22201
SHA1 hash:
5af79717807a0542ae53d0e2924524a84c8f743d
SH256 hash:
6e2f349d5b68b7f1c480f6535b4afdb185dc181746d52d260df17ffdfd6e6958
MD5 hash:
b6347f7f6458aba15820bb4fad715827
SHA1 hash:
43089784f8ad2b59d71c090c6fb950151ff88838
SH256 hash:
092e3d22d06a9b05486d44c5f6a9f80a59f5e028b88f273b7d64413a0713cfc0
MD5 hash:
fa83b540d172231014bd984484b695d4
SHA1 hash:
1e60b1fba16fe35d23e0131530992eade9a992e3
SH256 hash:
4b2a7ab74f2ad0c351d30ae856dcadc048f08a118e66ef465e02837ce61f9536
MD5 hash:
2cf873703f3b519c51584775eeecc9d2
SHA1 hash:
ee501bc6b8c53bea697547877ec7d96c132e5c56
SH256 hash:
9dc17242f1db11e98abe583a838e5f33b078038f1b3ed745a30d18c8017f1c0c
MD5 hash:
cd66aef6a4f52cb6132a74866f59fa37
SHA1 hash:
683820145480834294b7b63f3b153b954751ee37
SH256 hash:
9f6a696876fee8b811db8889bf4933262f4472ad41daea215d2e39bd537cf32f
MD5 hash:
33eeeb25f834e0b180f960ecb9518ea0
SHA1 hash:
61f73e692e9549ad8bc9b965e25d2da683d56dc1
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
CHECK_TRUST_INFORequires Elevated Execution (uiAccess:None)high
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::AllocateAndInitializeSid
ADVAPI32.dll::FreeSid
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
ole32.dll::CreateStreamOnHGlobal
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::CheckTokenMembership
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteW
SHELL32.dll::ShellExecuteExW
SHELL32.dll::SHGetFileInfoW
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessW
KERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::LoadLibraryA
KERNEL32.dll::GetDriveTypeW
KERNEL32.dll::GetStartupInfoW
KERNEL32.dll::GetStartupInfoA
KERNEL32.dll::GetDiskFreeSpaceExW
KERNEL32.dll::GetCommandLineW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::AssignProcessToJobObject
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::GetSystemDirectoryW
KERNEL32.dll::GetFileAttributesW
KERNEL32.dll::FindFirstFileW
WIN_USER_APIPerforms GUI ActionsUSER32.dll::CreateWindowExA
USER32.dll::CreateWindowExW

Comments