Report - mimikats.ps1

Hide_EXE Generic Malware Antivirus
ScreenShot
Created 2024.05.16 09:12 Machine s1_win7_x6401
Filename mimikats.ps1
Type ASCII text, with very long lines, with no line terminators
AI Score Not founds Behavior Score
2.6
ZERO API file : mailcious
VT API (file) 31 detected (Malicious, score, Mimikatz, Marte, Save, PowerShell, AndroDrp, PSempireInj, ExpKit, eydujq, CLASSIC, PShell, VPAP, PowSploit, dmclj, Detected, B@81qbmy, Powersploit, Sabe, B@gen, ai score=87)
md5 929da23097367077c3678dea19303133
sha256 c0610aac18112d627458c1a3a061358788a4d93b0e5dc24dc1260999d81b805a
ssdeep 12288:jzNjk1Cg5GqK8IdjKtPDnk76Nv3YeB040NTxYGQzpOT1IGMjLcMkLaCEa8U9YXlS:jze117nqS3zBuTmRi1wQmEbCsr
imphash
impfuzzy
  Network IP location

Signature (6cnts)

Level Description
danger File has been identified by 31 AntiVirus engines on VirusTotal as malicious
watch A potential heapspray has been detected. 50 megabytes was sprayed onto the heap of the powershell.exe process
notice Allocates read-write-execute memory (usually to unpack itself)
info Checks amount of memory in system
info Command line console output was observed
info Uses Windows APIs to generate a cryptographic key

Rules (3cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
warning hide_executable_file Hide executable file binaries (upload)
watch Antivirus Contains references to security software binaries (download)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure