Report Overview
Visitedpublic
2025-05-09 06:49:15
Tags
Submit Tags
URL
raw.githubusercontent.com/cyberden1/whitehat0x1/main/mimikatz_trunk.zip
Finishing URL
about:privatebrowsing
IP / ASN
185.199.108.133
#54113 FASTLY
Title
about:privatebrowsing

Detections

urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
36

Host Summary

HostRankRegisteredFirst SeenLast Seen
raw.githubusercontent.com
358022014-02-062014-03-012025-05-07

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


File detected

URL
raw.githubusercontent.com/cyberden1/whitehat0x1/main/mimikatz_trunk.zip
IP / ASN
185.199.111.133
#54113 FASTLY
File Overview
File TypeZip archive data, at least v2.0 to extract, compression method=deflate
Size1.2 MB (1206166 bytes)
MD5d2d3e1f8023b12fb89e400c7e8ecd7db
SHA14112ef95386ea4d1131be7c600d49a310e9d8f5b
Archive (12)
FilenameMD5File type
kiwi_passwords.yar21cb5b54ab42c19f66a10e839f789d64ASCII text, with CRLF line terminators
mimicom.idlca47e27329203c266372d04475db2c57ASCII text, with CRLF line terminators
README.md389833fb7cb7ceb525e914f0f36f2d40ASCII text
mimidrv.sys0818699d065afcb1f397d578d3708dc2PE32 executable (native) Intel 80386, for MS Windows, 7 sections
mimikatz.exed3b17ddf0b98fd2441ed46b033043456PE32 executable (console) Intel 80386, for MS Windows, 5 sections
mimilib.dll46e598798bdde4c72e796edcf2317b52PE32 executable (DLL) (console) Intel 80386, for MS Windows, 5 sections
mimilove.exec67f3497c310c01018f599b3eebae99ePE32 executable (console) Intel 80386, for MS Windows, 5 sections
mimispool.dlldab7a18b02399053ba3ff1e568789fcePE32 executable (DLL) (console) Intel 80386, for MS Windows, 5 sections
mimidrv.sys3e528207ca374123f63789195a4aeddePE32+ executable (native) x86-64, for MS Windows, 8 sections
mimikatz.exe29efd64dd3c7fe1e2b022b7ad73a1ba5PE32+ executable (console) x86-64, for MS Windows, 6 sections
mimilib.dll67651e9d2da634adedbe216948d5f752PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections
mimispool.dllc6cc0def7d584f431d69126c1cc33a20PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections

Detections

AnalyzerVerdictAlert
Public Nextron YARA rulesmalware
PowerShell with PE Reflective Injection
Public Nextron YARA rulesmalware
Detects strings found in Runspace Post Exploitation Toolkit
Public Nextron YARA rulesmalware
mimikatz
Public Nextron YARA rulesmalware
Detects Mimikatz strings
Elastic Security YARA Rulesmalware
Windows.Hacktool.Mimikatz
Public Nextron YARA rulesmalware
mimikatz
Public Nextron YARA rulesmalware
Detects Mimikatz strings
Public Nextron YARA rulesmalware
Detects mimikatz icon in PE file
Public Nextron YARA rulesmalware
Detects Powerkatz - a Mimikatz version prepared to run in memory via Powershell (overlap with other Mimikatz versions is possible)
Public Nextron YARA rulesmalware
Detects Mimikatz by using some special strings
YARAhub by abuse.chmalware
meth_stackstrings
Elastic Security YARA Rulesmalware
Windows.Hacktool.Mimikatz
Public Nextron YARA rulesmalware
Detects Mimikatz strings
Public Nextron YARA rulesmalware
mimikatz
Public Nextron YARA rulesmalware
Detects Mimikatz strings
Elastic Security YARA Rulesmalware
Windows.Hacktool.Mimikatz
Public Nextron YARA rulesmalware
mimikatz
Public Nextron YARA rulesmalware
Detects Mimikatz strings
Public Nextron YARA rulesmalware
Detects Mimikatz SkeletonKey in Memory
Public Nextron YARA rulesmalware
Detects mimikatz icon in PE file
Public Nextron YARA rulesmalware
Detects Powerkatz - a Mimikatz version prepared to run in memory via Powershell (overlap with other Mimikatz versions is possible)
Public Nextron YARA rulesmalware
Detects Mimikatz by using some special strings
Elastic Security YARA Rulesmalware
Windows.Hacktool.Mimikatz
Elastic Security YARA Rulesmalware
Windows.Hacktool.Mimikatz
Malpedia's yara-signator rulesmalware
Detects win.mimikatz.
Public Nextron YARA rulesmalware
Detects Mimikatz strings
VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize