MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c9a5e60fd024d07aaf86a0403edc8a3d0af5fcf8bd3216925774096f6ceab326. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Mimic
Vendor detections: 16
| SHA256 hash: | c9a5e60fd024d07aaf86a0403edc8a3d0af5fcf8bd3216925774096f6ceab326 |
|---|---|
| SHA3-384 hash: | c4ba4faf18b1c5033d5c830be450f4eee85220fa179d8059526e0ff33867d8ddb984df6db16dc5fdce33fd4cfe052e55 |
| SHA1 hash: | f24b759219eead7aa99adeceff8cbd4834a292ec |
| MD5 hash: | 6aa345742f02a14a9c508419c7f08dba |
| humanhash: | tennessee-nineteen-virginia-green |
| File name: | file |
| Download: | download sample |
| Signature | Mimic |
| File size: | 2'343'255 bytes |
| First seen: | 2026-01-15 12:31:18 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f6baa5eaa8231d4fe8e922a2e6d240ea (66 x CoinMiner, 22 x DCRat, 15 x LummaStealer) |
| ssdeep | 49152:EgwRvFs8pHZZqygAaByTlT+dSAOJoNQiTIhxExqFBo3LWXWM:EgwRtsiHZAy/aMTp4NQiaEY+WXWM |
| Threatray | 56 similar samples on MalwareBazaar |
| TLSH | T1D2B53341BFC74FF4F2A5A578160078827C7CFA741BE84ACFB39C44485AB52E1A6FA605 |
| TrID | 38.7% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 24.6% (.EXE) Win64 Executable (generic) (10522/11/4) 11.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 10.5% (.EXE) Win32 Executable (generic) (4504/4/1) 4.7% (.EXE) OS/2 Executable (generic) (2029/13) |
| Magika | pebin |
| dhash icon | 34f0c4c2d2c4c4d4 (4 x Mimic, 1 x Pay2Key) |
| Reporter | |
| Tags: | b dropped-by-gcleaner exe Mimic MIX9.file |
Intelligence
File Origin
# of uploads :
1
# of downloads :
138
Origin country :
USVendor Threat Intelligence
Malware configuration found for:
Archives
Details
Archives
extracted archive contents
Archives
an extracted 7-zip archive from the overlay data and SFX commands
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2026-01-15 12:31:58 UTC
Tags:
everything tool auto-reg auto generic smb ransomware
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Verdict:
Malicious
Score:
70.0%
Tags:
injection
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
adaptive-context fingerprint installer installer installer-heuristic keylogger masquerade microsoft_visual_cc obfuscated overlay overlay pay2key ransomware
Verdict:
Malicious
Labled as:
Win/grayware_confidence_60%
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-01-15T09:38:00Z UTC
Last seen:
2026-01-15T20:30:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Ransom.Win32.Generic Trojan.PowerShell.Kriptik.sba
Verdict:
Malicious
Score:
84%
Verdict:
Malware
File Type:
PE
Gathering data
Verdict:
Malicious
Threat:
Trojan-Ransom.Win32
Threat name:
Win32.Ransomware.Pay2Key
Status:
Suspicious
First seen:
2026-01-15 12:32:29 UTC
File Type:
PE (Exe)
Extracted files:
14
AV detection:
17 of 24 (70.83%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
hacktool_defendernot
Similar samples:
+ 46 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
7/10
Tags:
discovery execution upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
UPX packed file
Command and Scripting Interpreter: PowerShell
Checks computer location settings
Executes dropped EXE
Verdict:
Malicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
c9a5e60fd024d07aaf86a0403edc8a3d0af5fcf8bd3216925774096f6ceab326
MD5 hash:
6aa345742f02a14a9c508419c7f08dba
SHA1 hash:
f24b759219eead7aa99adeceff8cbd4834a292ec
SH256 hash:
e37aa72bca3cecb9bdbe51cbd81ec1143bb17163088a1379a4ccb93f5d881e76
MD5 hash:
5cac4fe734fc8454ccb847e030beee38
SHA1 hash:
34298fe220e35f614b2c837cf1dc2604ab0882d6
SH256 hash:
ad80064f71d273967dcf0b14b9cd6e84d79a132231d619687d9266c7807bdfe0
MD5 hash:
a35ee23aaab26afc575ac83df9572b57
SHA1 hash:
81ea38c694ce9702faddfb961f17c1bbf628a76d
SH256 hash:
00b9c0120df0595184523a3620ef9b3c3e11fc0e61d366d7eeabb646647cfceb
MD5 hash:
bd1f243ee2140f2f6118a7754ea02a63
SHA1 hash:
cdf7dd7dd1771edcc473037af80afd7e449e30d9
SH256 hash:
0377585ec50ed2e1b3d8519be272599f31024accd20b484ddae8240e09cc83b4
MD5 hash:
13d3997b43c3d5cbafb0ff10b6f0dee1
SHA1 hash:
e650a76f3fa8d28e2ff3751ccf44d124ef2b82bd
SH256 hash:
edfdd9a1567da779d8d481121f5f1b439106db54e9ad16dc5bb46486aa3a6c04
MD5 hash:
169df14926128c8c534d8485ae41285a
SHA1 hash:
0bc1b7f9bc4d7fb45619c1ffd1a2de4c0f9d263a
SH256 hash:
c5d1d1c4a53f057b790ee493c8b4b5d0be374f01368e24bb1b90550901ceac9f
MD5 hash:
027c49f0c54597f8f1e0806e94cd8568
SHA1 hash:
15784b9bc20adf174f5e81d248f8f0144496894c
SH256 hash:
e07d6c1d67c0660797aedea94432243c1d6d31c04223a691d3c740caf0555336
MD5 hash:
7e04cabe0211e35c276d3a58b141a143
SHA1 hash:
33e3ca0820210cf5707001716d09be229d156193
Detections:
INDICATOR_SUSPICIOUS_GENRansomware
INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM
INDICATOR_SUSPICIOUS_ClearWinLogs
INDICATOR_SUSPICIOUS_USNDeleteJournal
SH256 hash:
c295a3c20e18427a1e441793d60aaa2746cc0918b26fa675d0941a2c8e0fa25f
MD5 hash:
cb9d75d98fcd816d3da2a916bf1c0ac7
SHA1 hash:
4d4ad27d29d9781b6b98b8cad9cfa9c324db3ebf
SH256 hash:
e6af602bbb31c6463ec275c0f41a7d1e04b548cb8e452b4930861421c9eb7e0f
MD5 hash:
7d6e8aee49b2e94bd4db30b62bd07274
SHA1 hash:
cfa84deb6099dd0b646acd21e33db86c64eeb255
SH256 hash:
58ad69eb1564419b042596cd1a86b5a029a59efd2909fc1682424d8c0ad88700
MD5 hash:
8b2ee483ff7e4170f8f95aef84d8bac7
SHA1 hash:
83921af9225ee5d8ada94dba6bda6d43a25e8ece
SH256 hash:
49f23f83807913b84917cfdb800ac04d905fdc844f4b41b6aaf894506864355b
MD5 hash:
0faecd43382ab6f35d8b2be61939377e
SHA1 hash:
c6295657d52bc5dc16fa2542be23dac7948fa400
SH256 hash:
f457b1cb1b146ab07117e34dc50881ef787946a0311467d82469fdaa3e54884c
MD5 hash:
52b7073101ce2f83c85ed698f1ee0445
SHA1 hash:
cd2f016c79de7d4bf20d1366cc9483b610b4ffc2
Malware family:
Mimic
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Dropped by
Gcleaner
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.