Threat Database Backdoors Backdoor.Agent.TOD

Backdoor.Agent.TOD

By CagedTech in Backdoors

Threat Scorecard

Popularity Rank: 18,366
Threat Level: 60 % (Medium)
Infected Computers: 5
First Seen: January 29, 2026
Last Seen: May 5, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Backdoor.Agent.TOD
Signature status: No Signature

Known Samples

MD5: 81f16200633c2dae6c32adf32a0dd960
SHA1: 1abbd708b313fe3acabd1da2494a845bf9c256c6
SHA256: 79733F44FC7051AD8C9947C7C59959F1FEBA217DE8FF95F0AB4B2BBA849DC0AE
File Size: 1.61 MB, 1612288 bytes
MD5: c39dd9dea50a9ec6185fb528888f4d02
SHA1: ac70604107b2e5c61cc16a77ae9f66029fcf6e04
SHA256: 92174D2CC1F0A98EC28CDF5CF3812C7660725985FDE0566352668C54D29EA787
File Size: 1.18 MB, 1184038 bytes
MD5: 749d07beda254d60eaed203bdfd1f32a
SHA1: 8b92021d4d140bcd4b657332aa5fd7860d6e93a6
SHA256: 8724F26A031B9985E84597649D98D32636B7DABFFF8BF1AA8DDB4930C001BE8F
File Size: 1.21 MB, 1205284 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have security information
  • File has TLS information
  • File is 64-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name
  • Microsoft Corporation
  • Mono Compliance Neutron Association
  • TerraQuarkGray SA
File Description
  • Backend Pixel Micro Restore Helper
  • Measure Fabrication Component
  • Microsoft Service Host Helper
File Version
  • 10.0.22621.1
  • 8.5.21.526
  • 7.3.50.836
Internal Name
  • identity_log
  • script_auto
  • svchost
Legal Copyright
  • Copyright 2019, 2020 TerraQuarkGray SA
  • Copyright 2021 Mono Compliance Neutron Association
  • © Microsoft Corporation. All rights reserved.
Original Filename
  • identity_log
  • script_auto
  • svchost.exe
Product Name
  • Microsoft Windows Operating System
  • Small True Stream Packer 6d
  • Track Remarkable Quality Fragment
Product Version
  • 11.5.65.535
  • 10.0.22621.1
  • 7.3.50.836

File Traits

  • big overlay
  • fptable
  • HighEntropy
  • ntdll
  • x64

Block Information

Total Blocks: 854
Potentially Malicious Blocks: 11
Whitelisted Blocks: 841
Unknown Blocks: 2

Visual Map

1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 ? 0 x 0 x 0 0 0 0 x x 0 0 0 x ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 2 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Agent.TOE
  • Kryptik.JOU
  • Trojan.Kryptik.Gen.DJX

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtCompareObjects
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationThread
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWriteFile
Show More
  • UNKNOWN
Process Manipulation Evasion
  • NtUnmapViewOfSection
  • ReadProcessMemory
  • VirtualAllocEx
Process Shell Execute
  • CreateProcess
Thread Create Remote
  • CreateRemoteThread

Shell Command Execution

c:\users\user\downloads\1abbd708b313fe3acabd1da2494a845bf9c256c6_0001612288 (NULL)

Trending

Most Viewed

Loading...