Threat Database Trojans Trojan.Mimikatz.CG

Trojan.Mimikatz.CG

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 23,542
Threat Level: 80 % (High)
Infected Computers: 14
First Seen: December 28, 2021
Last Seen: November 21, 2025
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.Mimikatz.CG
Signature status: No Signature

Known Samples

MD5: 4e53f03c00e01c8bd172744f84c3d144
SHA1: 654f2d765845435e096888328658ec71a858cefd
SHA256: 31E1CA31B1609EA22395545A85B9395D38A835A4D85E4D024B9D1F7268E1F5E4
File Size: 1.51 MB, 1507840 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have security information
  • File has exports table
  • File is 64-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Company Name AhnLab, Inc.
File Description MeD Engine Extention
File Version 2.23.0.12
Internal Name MeDExt
Legal Copyright Copyright (C) AhnLab, Inc. 1988-2012. All rights reserved
Original Filename MeDExt.dll
Product Name AhnLab Smart Defense
Product Version 2.1.1.1

File Traits

  • dll
  • HighEntropy
  • x64

Block Information

Total Blocks: 3,680
Potentially Malicious Blocks: 1,239
Whitelisted Blocks: 2,441
Unknown Blocks: 0

Visual Map

x x x x x x 0 x x 0 0 x x x x 0 x 0 x x x x x x x x x x x x x x x x x x 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 x 0 0 x 0 x 0 0 0 x 0 x 0 x 0 0 0 0 x 0 x 0 0 0 0 0 x 0 x x x 0 x 0 x 0 x x 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 x 0 x 0 0 x 0 0 x 0 0 0 0 0 0 0 0 0 0 x 0 0 0 x 0 0 x 0 0 0 0 0 0 0 x 0 0 0 x x x x 0 0 x 0 0 0 0 0 x 0 0 0 0 x x x 0 0 0 0 0 x 0 0 0 0 0 x x 0 0 0 0 x 0 x 0 0 x 0 0 x 0 0 0 0 0 x x x 0 0 0 x x x x x 0 0 0 x 0 x 0 x 0 x 0 0 x 0 0 0 x 0 x 0 0 x x x 0 0 0 0 x x x 0 x 0 x x x 0 x x x 0 x 0 x x 0 x 0 0 0 0 0 0 x x x 0 x 0 x 0 x x x 0 0 x 0 0 0 x 0 0 x x x x 0 0 x 0 x x x 0 x 0 x 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 x 0 x 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 x 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 x 0 0 x 0 0 x 0 0 x 0 0 0 0 0 0 0 0 x 0 0 0 0 x x 0 0 x 0 0 x 0 0 0 0 x 0 x x 0 0 0 0 0 x x 0 x 0 0 0 0 0 0 0 0 0 x x 0 0 x x x 0 x x 0 x 0 0 0 x x 0 x x x 0 x x x x x x 0 0 0 x 0 0 0 0 0 0 x 0 x x 0 0 x 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 x 0 0 0 x x 0 x 0 0 0 0 x x 0 0 0 0 0 0 0 x x 0 0 0 x 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 x x 0 x x x 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 x x x 0 0 0 0 0 0 0 0 0 x 0 0 0 x 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 x x x x 0 0 x x 0 x 0 0 x x x 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 x 0 0 x 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 x 0 0 0 0 0 0 0 0 0 0 x x 0 0 x 0 0 x 0 0 x 0 0 x 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 x x 0 0 0 x x 0 0 x x x 0 0 x 0 0 0 0 0 0 x x 0 0 0 x 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 x 0 0 x 0 x x 0 x x 0 0 0 x 0 0 x x 0 0 x x x 0 x 0 0 x 0 x 0 x x x 0 0 x x x 0 0 0 x 0 0 0 0 0 0 0 0 0 x x x x x 0 0 x 0 0 0 0 x 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 x 0 x 0 0 x 0 0 x 0 0 0 x 0 0 0 0 0 x x 0 0 x x 0 0 0 x x x x x 0 x 0 0 x x 0 0 0 0 x 0 x 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 x 0 0 x 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 x 0 x x x 0 x x 0 x 0 0 0 0 x x x x x 0 x x 0 x x 0 x x 0 x 0 x 0 x x x x 0 0 x x x 0 x x 0 0 0 0 0 x x 0 0 0 0 x x 0 0 x 0 0 0 x 0 0 0 x 0 x x 0 0 0 0 0 0 x 0 x 0 0 x 0 x x 0 0 0 0 0 0 0 0 x x x x 0 x 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 x 0 0 0 0 x x 0 0 0 x 0 x 0 0 x 0 0 x 0 x x 0 x 0 0 0 0 0 0 x x x 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 x 0 x 0 x 0 x x 0 0 0 0 0 0 x 0 0 0 0 0 x 0 x x x x x 0 x x 0 0 0 x x x x 0 x x x 0 0 0 x 0 0 0 x 0 0 0 0 0 0 x x 0 0 0 x 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 x 0 0 x 0 x 0 0 0 0 0 0 0 0 0 x 0 0 x 0 0 0 x x 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 x 0 x 0 0 0 0 0 x x x x 0 x x x 0 0 0 x x 0 0 0 0 0 0 0 x 0 0 0 x x 0 0 0 0 0 0 x 0 0 0 0 0 0 0 x 0 0 0 0 0 0 x 0 0 0 x 0 0 0 0 0 0 0 0 0 0 x 0 0 x 0 x x x 0 x x x x x 0 x 0 0 0 0 0 x 0 0 0 0 0 0 x 0 0 x 0 0 0 0 0 0 0 0 0 x x 0 0 0 x 0 x 0 0 0 0 x x 0 x 0 x 0 0 0 0 x x 0 0 0 x 0 0 0 0 x x x x x x x x x x x x 0 x 0 0 0 0 0 0 0 x x x 0 0 0 0 0 x 0 0 0 0 x 0 0 x x 0 x 0 0 x 0 0 x x x x 0 x x x x x x 0 x x x x x 0 0 x x 0 0 0 0 x x x 0 x x 0 x x 0 0 0 0 0 0 0 0 0 0 x 0 0 x 0 x 0 0 0 0 x 0 0 0 0 0 x 0 x 0 x 0 x x 0 0 0 0 0 0 x x 0 0 0 0 0 x 0 0 0 0 0 x 0 0 0 0 x 0 0 x 0 0 0 x 0 x x 0 0 0 0 0 0 x x x x 0 0 x x 0 0 0 0 0 x 0 0 x 0 0 0 0 0 0 x x x 0 x x x 0 x x 0 x 0 0 x x 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 x x 0 0 0 0 0 0 x x 0 0 x 0 0 0 0 0 x 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 x 0 x x 0 0 x 0 0 0 0 0 x x x 0 0 x 0 0 0 x x 0 0 0 0 0 x x 0 0 x 0 0 0 0 0 0 0 0 x x 0 0 x 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 x 0 0 0 x x x 0 0 x 0 0 0 0 0 0 x 0 x x 0 0 x x x 0 x x x 0 0 0 0 x 0 x 0 0 0 x 0 x 0 0 0 0 0 0 x 0 x 0 0 x x 0 0 0 0 0 x 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 x 0 x x 0 0 x x x 0 x 0 0 0 x 0 0 0 x 0 0 x 0 0 0 x 0 0 x 0 0 x 0 0 0 x 0 0 0 x 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 x x x 0 x x x x x x 0 0 0 x 0 0 0 x 0 x 0 0 x 0 x 0 x x 0 x 0 0 x x x x 0 0 x x 0 x x x x x 0 0 x x 0 0 0 0 0 0 0 0 x 0 0 0 x x 0 0 0 0 0 x 0 0 x 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 x 0 x 0 0 x x 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 x x x x 0 0 0 0 x 0 x 0 x 0 0 0 0 0 x 0 x x 0
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Mimikatz.CG

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAccessCheck
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtClose
  • ntdll.dll!NtConnectPort
  • ntdll.dll!NtCreateMutant
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtDuplicateToken
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
Show More
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenProcessTokenEx
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenSemaphore
  • ntdll.dll!NtOpenThreadTokenEx
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtQueryWnfStateData
  • ntdll.dll!NtReleaseMutant
  • ntdll.dll!NtReleaseSemaphore
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtRequestWaitReplyPort
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationThread
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtSubscribeWnfStateChange
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtUnmapViewOfSectionEx
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWriteFile
  • UNKNOWN

Trending

Most Viewed

Loading...