Threat Database Backdoors Backdoor.Agent.LEA

Backdoor.Agent.LEA

By CagedTech in Backdoors

Threat Scorecard

Popularity Rank: 16,941
Threat Level: 60 % (Medium)
Infected Computers: 4
First Seen: June 18, 2024
Last Seen: November 2, 2025
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Backdoor.Agent.LEA
Signature status: No Signature

Known Samples

MD5: ca6e50504baac68a645c94f71ae1c952
SHA1: 4875d24447ebec03d14183965c79825a8b1abc10
SHA256: 1CBD929D43396A399A6837CCEE871897BD70BFE3E15A21B39F7A03AEFB9D45DE
File Size: 1.33 MB, 1334272 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have security information
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name Pekora Corporation
File Description Pekora
File Version 1, 7, 0, 0
Legal Copyright (C) 2025 Pekora Corporation. All rights reserved.
Original Filename Pekora.exe
Product Name Pekora Bootstrapper
Product Version 1, 7, 0, 0

File Traits

  • HighEntropy
  • x86

Block Information

Total Blocks: 2,614
Potentially Malicious Blocks: 607
Whitelisted Blocks: 2,007
Unknown Blocks: 0

Visual Map

0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 x x 0 0 0 0 x 0 0 0 0 0 0 x 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 x x x 0 0 x 0 0 0 0 0 0 x 0 0 0 x 0 0 0 0 x 0 0 0 x x 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 x x x 0 x x 0 0 x 0 0 0 x x x x x x x x x x x x 0 x x 0 0 0 0 x 0 0 0 0 0 x 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 x 0 0 0 x 0 0 x x 0 0 0 0 0 0 x x x 0 0 0 0 x 0 0 0 0 0 0 x 0 0 0 0 x x 0 0 0 x 0 0 0 x x x 0 0 0 0 0 0 0 0 0 x x x x x 0 x x x x x x 0 0 0 x x 0 x x 0 x x x x x x x x x x 0 0 0 x 0 0 0 x x x 0 x 0 0 x x 0 x 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 x x x 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 x 0 x x x 0 x x x 0 0 0 x x x x x 0 0 0 0 0 0 x 0 0 0 0 0 0 0 x x x 0 0 0 0 0 0 x 0 0 x x 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 x x 0 x x x 0 0 x x x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 x 0 0 0 0 x 0 0 x 0 0 x x 0 0 x x 0 0 x 0 0 x x 0 0 0 0 0 x 0 x x x 0 x 0 x 0 0 0 0 x 0 0 x x 0 0 x x 0 0 x x x x x x x x x 0 x x x x x x 0 x x x x 0 0 x x 0 x 0 0 x 0 0 0 x 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 x x x x x 0 x 0 x x 0 0 0 x 0 x x x 0 x x x 0 x 0 0 0 0 0 x x 0 0 0 0 0 0 x 0 0 0 0 x x 0 x 0 0 0 x 0 0 0 0 0 0 0 0 0 x x 0 x 0 x 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 x 0 x 0 x 0 0 0 0 0 0 0 0 x x 0 0 x x 0 x 0 x x x x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x 0 x x x x x x 0 x x 0 x x 0 x x 0 0 x x 0 x x 0 x x 0 x x x x x x 0 0 0 0 x x x x x 0 0 0 x x x 0 x x 0 x 0 x x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 x x 0 x 0 x 0 x x x x 0 x 0 0 0 0 x 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 x 0 0 0 x x x x x x 0 0 0 x x x x x x 0 0 0 0 x 0 0 x 0 0 0 x 0 x x x x 0 x x x 0 x x x x 0 0 x 0 0 0 x 0 0 0 x 0 0 0 0 0 x 0 0 x 0 0 0 0 x 0 x x 0 0 x 0 x x 0 x x x 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 x 0 x x 0 0 0 x 0 x x 0 x 0 0 0 x 0 0 x 0 0 0 0 x x x 0 x x 0 0 x x x x 0 0 0 0 0 0 0 0 0 0 0 x x x 0 0 x x x x x 0 x x 0 x x x x x x x x x x x x x x x x x x x x x x 0 x x x 0 0 x x x x x x x x x x x x x x x x x x x 0 x x 0 x x x x x x x x x x x x 0 x x x x x x x x 0 0 0 x 0 0 0 0 0 x x x 0 0 0 x 0 x x 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 x x x 0 0 0 0 0 0 0 x 0 x x 0 0 x x x 0 0 0 0 x x x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 x x 0 0 0 x x 0 x x 0 x x x x 0 x x 0 x x x 0 0 x 0 0 x 0 0 x 0 0 x 0 0 0 0 0 x x x x x x x x x x x 0 0 0 x 0 0 x 0 0 0 0 0 0 0 0 0 0 0 x 0 x x 0 x 0 x 0 0 x 0 x 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 x x x x x 0 x x 0 x 0 0 0 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 0 0 0 0 x x x x x x x x 0 0 x x x x x 0 x x x x x x 0 x x x 0 x 0 x x x 0 0 0 x 0 0 x x x 0 0 x x x 0 0 0 0 x x x 0 0 0 0 x x 0 x x x x x x x x x x 0 0 x 0 x x x 0 0 0 x x 0 x x 0 x x 0 x x 0 x x 0 0 0 0 0 x x x x x 0 x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 1 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 3 1 1 1 1 1 0 0 1 1 1 2 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 1 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 2 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 2 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 1 0 1 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Agent.LEA

Files Modified

File Attributes
c:\users\user\appdata\local\temp\pjx-cc0cde74.log Generic Write,Read Attributes

Registry Modifications

Key::Value Data API Name
HKCU\software\pekora corporation\pekora::cpath C:\Users\user\AppData\LocalLow\rbxcsettings.rbx RegNtPreCreateKey

Windows API Usage

Category API
Network Winsock2
  • WSASend
  • WSASocket
  • WSAStartup
Network Info Queried
  • GetAdaptersInfo
Network Wininet
  • HttpOpenRequest
  • HttpQueryInfo
  • HttpSendRequest
  • InternetConnect
  • InternetOpen
Network Winhttp
  • WinHttpOpen
Network Winsock
  • closesocket
  • connect
  • freeaddrinfo
  • getaddrinfo

Trending

Most Viewed

Loading...