Skip to main content
Skip to main content
Published Jun 04, 2019 | Updated Nov 11, 2025

HackTool:SH/Mimikatz

Detected by Microsoft Defender Antivirus

Aliases: No associated aliases

Summary

HackTool:SH/Mimikatz is a shell script adaptation of the Mimikatz credential harvesting tool, engineered for Unix-like operating systems such as Linux and macOS. This variant translates the powerful credential-dumping capabilities of the original Windows tool into a scripting language native to server and cloud environments. Its primary function is to extract authentication materials like plaintext passwords, cryptographic hashes, and Kerberos tickets from system memory and various credential stores. 

The shell script implementation is particularly effective in cloud and containerized infrastructures because it leverages trusted system utilities and interpreters, making it difficult to detect with traditional signature-based antivirus software. Its cross-platform nature and reliance on ubiquitous shell environments make it a flexible tool for threat actors who have gained an initial foothold and seek to escalate privileges and move laterally through a network. 

  • Disconnect the compromised device from all networks (both wired and Wi-Fi) as soon as possible. This severs the threat actor’s remote connection and prevents further data exfiltration. 
  •  Identify all user and service accounts that are active on or accessible from the compromised host. Force a mandatory password reset for these accounts, as well as for other potentially exposed credentials like email and business systems. Revoke all associated SSH keys, API tokens, and Kerberos tickets. 
  • Terminate any suspicious processes and remove unauthorized scripts. For a thorough cleanup, it is recommended to reimage the host operating system from a known clean backup or source. A simple reboot may not be sufficient to remove all persistence mechanisms. 

Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts. 

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help. 

Follow us