Report Overview

  1. Visited public
    2025-05-06 23:05:25
    Tags
  2. URL

    github.com/gentilkiwi/mimikatz/releases/download/2.2.0-20210810-2/mimikatz_trunk.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    140.82.121.3

    #36459 GITHUB

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
37

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
github.com1423unknownNo dataNo data
objects.githubusercontent.com134060unknownNo dataNo data

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    objects.githubusercontent.com/github-production-release-asset-2e65be/18496166/bfc2b8f2-26e7-4893-9a4e-4d26a676794b?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20250506%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250506T230452Z&X-Amz-Expires=300&X-Amz-Signature=9a8cda3648fc1e4aab5a8f1799a825ec56db3fe4e086e77ce720e2e7497dfbaf&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3Dmimikatz_trunk.zip&response-content-type=application%2Foctet-stream

  2. IP

    185.199.108.133

  3. ASN

    #54113 FASTLY

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    1.3 MB (1253993 bytes)

  2. Hash

    1061904cc31a0e8931d80523fda53df0

    830e45cddc3c096c7a0125c1e5717071f2ec6251

  1. Archive (12)

  2. FilenameMd5File type
    kiwi_passwords.yar
    21cb5b54ab42c19f66a10e839f789d64
    ASCII text, with CRLF line terminators
    mimicom.idl
    ca47e27329203c266372d04475db2c57
    ASCII text, with CRLF line terminators
    README.md
    389833fb7cb7ceb525e914f0f36f2d40
    ASCII text
    mimidrv.sys
    c73e71825adbfb9821b9fa6e8672903c
    PE32 executable (native) Intel 80386, for MS Windows, 7 sections
    mimikatz.exe
    6c9ad4e67032301a61a9897377d9cff8
    PE32 executable (console) Intel 80386, for MS Windows, 5 sections
    mimilib.dll
    d0a1828f64842dde399244d604ceea24
    PE32 executable (DLL) (console) Intel 80386, for MS Windows, 5 sections
    mimilove.exe
    825e6e194a9d5e12cbf109b7de07a244
    PE32 executable (console) Intel 80386, for MS Windows, 5 sections
    mimispool.dll
    64321f9e601651cb623e63d67de6c984
    PE32 executable (DLL) (console) Intel 80386, for MS Windows, 5 sections
    mimidrv.sys
    c94de9019767a79573b25c870936d9a8
    PE32+ executable (native) x86-64, for MS Windows, 8 sections
    mimikatz.exe
    bb8bdb3e8c92e97e2f63626bc3b254c4
    PE32+ executable (console) x86-64, for MS Windows, 6 sections
    mimilib.dll
    ddfad0d55be70acdfea36acf28d418b3
    PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections
    mimispool.dll
    a03b57cc0103316e974bbb0f159f78f6
    PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    PowerShell with PE Reflective Injection
    Public Nextron YARA rulesmalware
    Detects strings found in Runspace Post Exploitation Toolkit
    Public Nextron YARA rulesmalware
    mimikatz
    Public Nextron YARA rulesmalware
    Detects Mimikatz strings
    Elastic Security YARA Rulesmalware
    Windows.Hacktool.Mimikatz
    Public Nextron YARA rulesmalware
    mimikatz
    Public Nextron YARA rulesmalware
    Detects Mimikatz strings
    Public Nextron YARA rulesmalware
    Detects mimikatz icon in PE file
    Public Nextron YARA rulesmalware
    Detects Powerkatz - a Mimikatz version prepared to run in memory via Powershell (overlap with other Mimikatz versions is possible)
    Public Nextron YARA rulesmalware
    Detects Mimikatz by using some special strings
    YARAhub by abuse.chmalware
    meth_stackstrings
    Elastic Security YARA Rulesmalware
    Windows.Hacktool.Mimikatz
    Public Nextron YARA rulesmalware
    Detects Mimikatz strings
    Public Nextron YARA rulesmalware
    mimikatz
    Public Nextron YARA rulesmalware
    Detects Mimikatz strings
    Elastic Security YARA Rulesmalware
    Windows.Hacktool.Mimikatz
    Public Nextron YARA rulesmalware
    Detects different hacktools based on their imphash
    Public Nextron YARA rulesmalware
    mimikatz
    Public Nextron YARA rulesmalware
    Detects Mimikatz strings
    Public Nextron YARA rulesmalware
    Detects Mimikatz SkeletonKey in Memory
    Public Nextron YARA rulesmalware
    Detects mimikatz icon in PE file
    Public Nextron YARA rulesmalware
    Detects Powerkatz - a Mimikatz version prepared to run in memory via Powershell (overlap with other Mimikatz versions is possible)
    Public Nextron YARA rulesmalware
    Detects Mimikatz by using some special strings
    Elastic Security YARA Rulesmalware
    Windows.Hacktool.Mimikatz
    Elastic Security YARA Rulesmalware
    Windows.Hacktool.Mimikatz
    Malpedia's yara-signator rulesmalware
    Detects win.mimikatz.
    Public Nextron YARA rulesmalware
    Detects Mimikatz strings
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
github.com/gentilkiwi/mimikatz/releases/download/2.2.0-20210810-2/mimikatz_trunk.zip
140.82.121.3302 Found1.3 MB
objects.githubusercontent.com/github-production-release-asset-2e65be/18496166/bfc2b8f2-26e7-4893-9a4e-4d26a676794b?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20250506%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250506T230452Z&X-Amz-Expires=300&X-Amz-Signature=9a8cda3648fc1e4aab5a8f1799a825ec56db3fe4e086e77ce720e2e7497dfbaf&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3Dmimikatz_trunk.zip&response-content-type=application%2Foctet-stream
185.199.108.133200 OK1.3 MB