Threat Database Backdoors Backdoor.Agent.BNC

Backdoor.Agent.BNC

By CagedTech in Backdoors

Threat Scorecard

Popularity Rank: 1,206
Threat Level: 60 % (Medium)
Infected Computers: 2,635
First Seen: January 2, 2024
Last Seen: November 3, 2025
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Backdoor.Agent.BNC
Signature status: No Signature

Known Samples

MD5: 738b0cd3d232a94fad2e3338491523cf
SHA1: 524ae191af99b1b5e173e5d352412cd8078d2955
SHA256: F06646CED718C0C1E087A52CE15B0818993A1B8994013307A511DB7EB61999E1
File Size: 7.09 MB, 7091824 bytes
MD5: e35c43786a139213da230e7001ad14dc
SHA1: a4fd095a7062ed6a62ab5010ae1a72b1fbad290e
SHA256: 7A04A5DE0107752625A3E4EAFEDDA3EC6B6E8532B66F0593B974925703DDD18C
File Size: 6.64 MB, 6640890 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments This installation was built with Inno Setup.
File Description
  • FIFA 09 Setup
  • Microsoft Flight Simulator Setup
Legal Copyright FitGirl
Product Name
  • FIFA 09
  • Microsoft Flight Simulator

File Traits

  • HighEntropy
  • No Version Info
  • x86

Files Modified

File Attributes
c:\users\user\appdata\local\temp\is-3e1ia.tmp\a4fd095a7062ed6a62ab5010ae1a72b1fbad290e_0006640890.tmp Generic Write,Read Attributes

Windows API Usage

Category API
Process Shell Execute
  • CreateProcess
User Data Access
  • GetUserObjectInformation

Shell Command Execution

"C:\Users\Qqoiisvu\AppData\Local\Temp\is-3E1IA.tmp\a4fd095a7062ed6a62ab5010ae1a72b1fbad290e_0006640890.tmp" /SL5="$40060,6200044,119440,c:\users\user\downloads\a4fd095a7062ed6a62ab5010ae1a72b1fbad290e_0006640890"

Trending

Most Viewed

Loading...