Report Overview
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
github.com | 1423 | unknown | No data | No data | 550 B | 1.2 MB | ![]() |
objects.githubusercontent.com | 134060 | unknown | No data | No data | 974 B | 1.2 MB | ![]() |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Threat Detection Systems
Public InfoSec YARA rules
No alerts detected
OpenPhish
No alerts detected
PhishTank
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
Files detected
URL
objects.githubusercontent.com/github-production-release-asset-2e65be/18496166/28e3acb5-ca66-40d5-bc68-f76f5bfabecf?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20250506%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250506T013030Z&X-Amz-Expires=300&X-Amz-Signature=f0130ca690aae9914200f938b2fa35bde782c458dc84ac7160807ba7e8225243&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3Dmimikatz_trunk.zip&response-content-type=application%2Foctet-stream
IP
185.199.110.133
ASN
#54113 FASTLY
File type
Zip archive data, at least v2.0 to extract, compression method=deflate
Size
1.2 MB (1206166 bytes)
Hash
d2d3e1f8023b12fb89e400c7e8ecd7db
4112ef95386ea4d1131be7c600d49a310e9d8f5b
Archive (12)
Filename | Md5 | File type | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
kiwi_passwords.yar | 21cb5b54ab42c19f66a10e839f789d64
| ASCII text, with CRLF line terminators | ||||||||||||||||||||||||||||||
mimicom.idl | ca47e27329203c266372d04475db2c57 | ASCII text, with CRLF line terminators | ||||||||||||||||||||||||||||||
README.md | 389833fb7cb7ceb525e914f0f36f2d40
| ASCII text | ||||||||||||||||||||||||||||||
mimidrv.sys | 0818699d065afcb1f397d578d3708dc2
| PE32 executable (native) Intel 80386, for MS Windows, 7 sections | ||||||||||||||||||||||||||||||
mimikatz.exe | d3b17ddf0b98fd2441ed46b033043456
| PE32 executable (console) Intel 80386, for MS Windows, 5 sections | ||||||||||||||||||||||||||||||
mimilib.dll | 46e598798bdde4c72e796edcf2317b52
| PE32 executable (DLL) (console) Intel 80386, for MS Windows, 5 sections | ||||||||||||||||||||||||||||||
mimilove.exe | c67f3497c310c01018f599b3eebae99e
| PE32 executable (console) Intel 80386, for MS Windows, 5 sections | ||||||||||||||||||||||||||||||
mimispool.dll | dab7a18b02399053ba3ff1e568789fce
| PE32 executable (DLL) (console) Intel 80386, for MS Windows, 5 sections | ||||||||||||||||||||||||||||||
mimidrv.sys | 3e528207ca374123f63789195a4aedde
| PE32+ executable (native) x86-64, for MS Windows, 8 sections | ||||||||||||||||||||||||||||||
mimikatz.exe | 29efd64dd3c7fe1e2b022b7ad73a1ba5
| PE32+ executable (console) x86-64, for MS Windows, 6 sections | ||||||||||||||||||||||||||||||
mimilib.dll | 67651e9d2da634adedbe216948d5f752
| PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections | ||||||||||||||||||||||||||||||
mimispool.dll | c6cc0def7d584f431d69126c1cc33a20
| PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections |
Detections
Analyzer | Verdict | Alert |
---|---|---|
Public Nextron YARA rules | malware | PowerShell with PE Reflective Injection |
Public Nextron YARA rules | malware | Detects strings found in Runspace Post Exploitation Toolkit |
Public Nextron YARA rules | malware | mimikatz |
Public Nextron YARA rules | malware | Detects Mimikatz strings |
Elastic Security YARA Rules | malware | Windows.Hacktool.Mimikatz |
Public Nextron YARA rules | malware | mimikatz |
Public Nextron YARA rules | malware | Detects Mimikatz strings |
Public Nextron YARA rules | malware | Detects mimikatz icon in PE file |
Public Nextron YARA rules | malware | Detects Powerkatz - a Mimikatz version prepared to run in memory via Powershell (overlap with other Mimikatz versions is possible) |
Public Nextron YARA rules | malware | Detects Mimikatz by using some special strings |
YARAhub by abuse.ch | malware | meth_stackstrings |
Elastic Security YARA Rules | malware | Windows.Hacktool.Mimikatz |
Public Nextron YARA rules | malware | Detects Mimikatz strings |
Public Nextron YARA rules | malware | mimikatz |
Public Nextron YARA rules | malware | Detects Mimikatz strings |
Elastic Security YARA Rules | malware | Windows.Hacktool.Mimikatz |
Public Nextron YARA rules | malware | mimikatz |
Public Nextron YARA rules | malware | Detects Mimikatz strings |
Public Nextron YARA rules | malware | Detects Mimikatz SkeletonKey in Memory |
Public Nextron YARA rules | malware | Detects mimikatz icon in PE file |
Public Nextron YARA rules | malware | Detects Powerkatz - a Mimikatz version prepared to run in memory via Powershell (overlap with other Mimikatz versions is possible) |
Public Nextron YARA rules | malware | Detects Mimikatz by using some special strings |
Elastic Security YARA Rules | malware | Windows.Hacktool.Mimikatz |
Elastic Security YARA Rules | malware | Windows.Hacktool.Mimikatz |
Malpedia's yara-signator rules | malware | Detects win.mimikatz. |
Public Nextron YARA rules | malware | Detects Mimikatz strings |
VirusTotal | malicious |
JavaScript (0)
HTTP Transactions (2)
URL | IP | Response | Size | |||||||
---|---|---|---|---|---|---|---|---|---|---|
github.com/gentilkiwi/mimikatz/releases/download/2.2.0-20220919/mimikatz_trunk.zip | ![]() | 302 Found | 1.2 MB | |||||||
HTTP Headers
| ||||||||||
objects.githubusercontent.com/github-production-release-asset-2e65be/18496166/28e3acb5-ca66-40d5-bc68-f76f5bfabecf?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20250506%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250506T013030Z&X-Amz-Expires=300&X-Amz-Signature=f0130ca690aae9914200f938b2fa35bde782c458dc84ac7160807ba7e8225243&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3Dmimikatz_trunk.zip&response-content-type=application%2Foctet-stream | ![]() | 200 OK | 1.2 MB | |||||||
Detections
HTTP Headers
| ||||||||||