Report Overview
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
github.com | 1423 | 2007-10-09 | 2016-07-13 12:28:22 | 2024-02-27 05:10:54 | 538 B | 3.9 kB | ![]() |
objects.githubusercontent.com | 134060 | 2014-02-06 | 2021-11-01 22:34:29 | 2024-02-27 19:08:56 | 995 B | 1.3 MB | ![]() |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Threat Detection Systems
Public InfoSec YARA rules
No alerts detected
OpenPhish
No alerts detected
PhishTank
No alerts detected
mnemonic secure dns
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
Files detected
URL
objects.githubusercontent.com/github-production-release-asset-2e65be/18496166/bfc2b8f2-26e7-4893-9a4e-4d26a676794b?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAVCODYLSA53PQK4ZA%2F20240228%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240228T055928Z&X-Amz-Expires=300&X-Amz-Signature=8732ac8d176ced301fe514b0c650032a1239bb93d8316c1a6dfe5693b6132666&X-Amz-SignedHeaders=host&actor_id=0&key_id=0&repo_id=18496166&response-content-disposition=attachment%3B%20filename%3Dmimikatz_trunk.zip&response-content-type=application%2Foctet-stream
IP
185.199.109.133
ASN
#54113 FASTLY
File type
Zip archive data, at least v2.0 to extract, compression method=deflate
Size
1.3 MB (1253993 bytes)
Hash
1061904cc31a0e8931d80523fda53df0
830e45cddc3c096c7a0125c1e5717071f2ec6251
Archive (12)
Filename | Md5 | File type | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
kiwi_passwords.yar | 21cb5b54ab42c19f66a10e839f789d64
| ASCII text, with CRLF line terminators | |||||||||||||||||||||||||||||||||
mimicom.idl | ca47e27329203c266372d04475db2c57 | ASCII text, with CRLF line terminators | |||||||||||||||||||||||||||||||||
README.md | 389833fb7cb7ceb525e914f0f36f2d40
| ASCII text | |||||||||||||||||||||||||||||||||
mimidrv.sys | c73e71825adbfb9821b9fa6e8672903c
| PE32 executable (native) Intel 80386, for MS Windows, 7 sections | |||||||||||||||||||||||||||||||||
mimikatz.exe | 6c9ad4e67032301a61a9897377d9cff8
| PE32 executable (console) Intel 80386, for MS Windows, 5 sections | |||||||||||||||||||||||||||||||||
mimilib.dll | d0a1828f64842dde399244d604ceea24
| PE32 executable (DLL) (console) Intel 80386, for MS Windows, 5 sections | |||||||||||||||||||||||||||||||||
mimilove.exe | 825e6e194a9d5e12cbf109b7de07a244
| PE32 executable (console) Intel 80386, for MS Windows, 5 sections | |||||||||||||||||||||||||||||||||
mimispool.dll | 64321f9e601651cb623e63d67de6c984
| PE32 executable (DLL) (console) Intel 80386, for MS Windows, 5 sections | |||||||||||||||||||||||||||||||||
mimidrv.sys | c94de9019767a79573b25c870936d9a8
| PE32+ executable (native) x86-64, for MS Windows, 8 sections | |||||||||||||||||||||||||||||||||
mimikatz.exe | bb8bdb3e8c92e97e2f63626bc3b254c4
| PE32+ executable (console) x86-64, for MS Windows, 6 sections | |||||||||||||||||||||||||||||||||
mimilib.dll | ddfad0d55be70acdfea36acf28d418b3
| PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections | |||||||||||||||||||||||||||||||||
mimispool.dll | a03b57cc0103316e974bbb0f159f78f6
| PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections |
Detections
Analyzer | Verdict | Alert |
---|---|---|
Public Nextron YARA rules | malware | PowerShell with PE Reflective Injection |
Public Nextron YARA rules | malware | Detects strings found in Runspace Post Exploitation Toolkit |
Public Nextron YARA rules | malware | mimikatz |
Public Nextron YARA rules | malware | Detects Mimikatz strings |
Elastic Security YARA Rules | malware | Windows.Hacktool.Mimikatz |
Public Nextron YARA rules | malware | mimikatz |
Public Nextron YARA rules | malware | Detects Mimikatz strings |
Public Nextron YARA rules | malware | Detects mimikatz icon in PE file |
Public Nextron YARA rules | malware | Detects Powerkatz - a Mimikatz version prepared to run in memory via Powershell (overlap with other Mimikatz versions is possible) |
Public Nextron YARA rules | malware | Detects Mimikatz by using some special strings |
YARAhub by abuse.ch | malware | meth_stackstrings |
Elastic Security YARA Rules | malware | Windows.Hacktool.Mimikatz |
Public Nextron YARA rules | malware | Detects Mimikatz strings |
Public Nextron YARA rules | malware | mimikatz |
Public Nextron YARA rules | malware | Detects Mimikatz strings |
Elastic Security YARA Rules | malware | Windows.Hacktool.Mimikatz |
Public Nextron YARA rules | malware | Detects different hacktools based on their imphash |
Public Nextron YARA rules | malware | mimikatz |
Public Nextron YARA rules | malware | Detects Mimikatz strings |
Public Nextron YARA rules | malware | Detects Mimikatz SkeletonKey in Memory |
Public Nextron YARA rules | malware | Detects mimikatz icon in PE file |
Public Nextron YARA rules | malware | Detects Powerkatz - a Mimikatz version prepared to run in memory via Powershell (overlap with other Mimikatz versions is possible) |
Public Nextron YARA rules | malware | Detects Mimikatz by using some special strings |
Elastic Security YARA Rules | malware | Windows.Hacktool.Mimikatz |
Elastic Security YARA Rules | malware | Windows.Hacktool.Mimikatz |
Malpedia's yara-signator rules | malware | Detects win.mimikatz. |
Public Nextron YARA rules | malware | Detects Mimikatz strings |
VirusTotal | malicious |
JavaScript (0)
HTTP Transactions (2)
URL | IP | Response | Size | |||||||
---|---|---|---|---|---|---|---|---|---|---|
github.com/gentilkiwi/mimikatz/releases/download/2.2.0-20210810-2/mimikatz_trunk.zip | ![]() | 302 Found | 0 B | |||||||
HTTP Headers
| ||||||||||
objects.githubusercontent.com/github-production-release-asset-2e65be/18496166/bfc2b8f2-26e7-4893-9a4e-4d26a676794b?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAVCODYLSA53PQK4ZA%2F20240228%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240228T055928Z&X-Amz-Expires=300&X-Amz-Signature=8732ac8d176ced301fe514b0c650032a1239bb93d8316c1a6dfe5693b6132666&X-Amz-SignedHeaders=host&actor_id=0&key_id=0&repo_id=18496166&response-content-disposition=attachment%3B%20filename%3Dmimikatz_trunk.zip&response-content-type=application%2Foctet-stream | ![]() | 200 OK | 1.3 MB | |||||||
Detections
HTTP Headers
| ||||||||||