Threat Database Backdoors Backdoor.MSIL.Agent.SKA

Backdoor.MSIL.Agent.SKA

By CagedTech in Backdoors

Threat Scorecard

Popularity Rank: 13,788
Threat Level: 60 % (Medium)
Infected Computers: 1,051
First Seen: April 17, 2024
Last Seen: March 5, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Backdoor.MSIL.Agent.SKA
Signature status: No Signature

Known Samples

MD5: 275e8d513e0c0e3322f79b4f3d0f845c
SHA1: 37895edd25736607a40b10505daa0567d2f12ca9
SHA256: 4D69EA2B492F97A010D62318A6A4FADF10486D6AD674D3E2A0194E18FE74A0C4
File Size: 298.03 KB, 298026 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
File Description hawaiians
File Version 2.4.7.81
Legal Copyright hawaiians hawaiians
Original Filename hors.exe
Product Name hawaiians 2.4.7.81
Product Version 2.4.7.81

File Traits

  • .NET
  • x86

Files Modified

File Attributes
\device\namedpipe\gmdasllogger Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsqbc80.tmp Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nsqbc80.tmp\drunkard.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsqbc80.tmp\drunkard.exe Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nsqbc80.tmp\drunkard.exe.config Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsqbc80.tmp\drunkard.exe.config Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nsqbc80.tmp\microsoft.web.webview2.core.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsqbc80.tmp\microsoft.web.webview2.core.dll Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nsqbc80.tmp\microsoft.web.webview2.winforms.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsqbc80.tmp\microsoft.web.webview2.winforms.dll Synchronize,Write Attributes
Show More
c:\users\user\appdata\local\temp\nsqbc80.tmp\microsoft.web.webview2.wpf.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsqbc80.tmp\microsoft.web.webview2.wpf.dll Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nsqbc80.tmp\webview2loader.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsqbc80.tmp\webview2loader.dll Synchronize,Write Attributes

Registry Modifications

Key::Value Data API Name
HKLM\system\controlset001\control\session manager::pendingfilerenameoperations *1\??\C:\Windows\SystemTemp\MicrosoftEdgeUpdate.exe.old5af52*1\??\C:\Windows\SystemTemp\CopilotUpdate.exe.old5af62*1\??\C:\P RegNtPreCreateKey
HKLM\system\controlset001\control\session manager::pendingfilerenameoperations *1\??\C:\Windows\SystemTemp\MicrosoftEdgeUpdate.exe.old5af52*1\??\C:\Windows\SystemTemp\CopilotUpdate.exe.old5af62*1\??\C:\P RegNtPreCreateKey

Windows API Usage

Category API
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetComputerNameEx
  • GetUserDefaultLocaleName
  • GetUserObjectInformation
Process Manipulation Evasion
  • NtUnmapViewOfSection
  • ZwMapViewOfSection
Process Shell Execute
  • CreateProcess
Syscall Use
  • ntdll.dll!NtAlertThreadByThreadId
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClearEvent
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateEvent
  • ntdll.dll!NtCreateMutant
  • ntdll.dll!NtCreatePrivateNamespace
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtCreateSemaphore
  • ntdll.dll!NtCreateThreadEx
Show More
  • ntdll.dll!NtDuplicateObject
  • ntdll.dll!NtEnumerateKey
  • ntdll.dll!NtEnumerateValueKey
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenDirectoryObject
  • ntdll.dll!NtOpenEvent
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcess
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenThreadToken
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryDefaultLocale
  • ntdll.dll!NtQueryDirectoryFileEx
  • ntdll.dll!NtQueryFullAttributesFile
  • ntdll.dll!NtQueryInformationFile
  • ntdll.dll!NtQueryInformationJobObject
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryLicenseValue
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQuerySecurityObject
  • ntdll.dll!NtQuerySystemInformation
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtQueryWnfStateData
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtReadRequestData
  • ntdll.dll!NtReleaseMutant
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtResumeThread
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationKey
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationThread
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtSubscribeWnfStateChange
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtUnmapViewOfSectionEx
  • ntdll.dll!NtWaitForAlertByThreadId
  • ntdll.dll!NtWaitForMultipleObjects
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWriteFile
  • UNKNOWN

Shell Command Execution

C:\Users\Uiaahjlt\AppData\Local\Temp\nsqBC80.tmp\Drunkard.exe ""

Trending

Most Viewed

Loading...