Threat Database Backdoors Backdoor.MSIL.AgentTesla.PH

Backdoor.MSIL.AgentTesla.PH

By CagedTech in Backdoors

Threat Scorecard

Popularity Rank: 9,693
Threat Level: 60 % (Medium)
Infected Computers: 53
First Seen: August 28, 2024
Last Seen: March 20, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Backdoor.MSIL.AgentTesla.PH
Signature status: No Signature

Known Samples

MD5: 1367070e83b95143106feba12485eb58
SHA1: 14b311b68a1f0a7b7beb91622edc88bb7d7a7ade
SHA256: F10B6C4DB40AD84F88F9F4591D68B3DE2B3F19E46751D4A8869A346647FC6443
File Size: 865.79 KB, 865792 bytes
MD5: 6eb464923ac1f94dc8d9563f1afc4bbb
SHA1: 94c038eb19623856a5b500564838fec2446eac0c
SHA256: 342AC1F8CB57D8745155D4DD1C8395131CB0C8FB11F2B8D031B92EAD0F4556B6
File Size: 841.22 KB, 841216 bytes
MD5: 2b5882623a545a457ae157812e6163fc
SHA1: 8abdfb8638943fb02fd8a213df62b2d3f3f4ee68
SHA256: 7FE162B84E6D99ECAFE3DCD7418848246A7B3FACF9EACD03A0B6F54EFFC925C2
File Size: 418.82 KB, 418816 bytes
MD5: 7dbb8b87a7bc6ce2d0c44a36685d88e3
SHA1: cccb92152459d31b9c48c9c4ca0a24bab02d9905
SHA256: FCE4F1C8C5AC29A62EBB007AB3EAE83D24E4FBFD833319DDC4BF62C2ABAAC73A
File Size: 435.71 KB, 435712 bytes
MD5: 8c265a26ffeafa347a9607f36d353250
SHA1: 29f53d09473d0f32dc5e0ed22a41a2ab46d9fa8b
SHA256: B305079D40311C34F42BEFFA8668E17EDDBEBDE00EC0DA04CE43CA25E12B60F2
File Size: 434.18 KB, 434176 bytes
Show More
MD5: fe67f0a9a31716d9c7e67af6a5a2df0e
SHA1: e4dfc0763e86f9d295c8e10947363577b4c14f7e
SHA256: E4355C6FC5F24CD6584A525C12AF5B6378D776738CB6192A0D4BAC3584FB1732
File Size: 356.35 KB, 356352 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have security information
  • File has exports table
  • File is .NET application
  • File is 32-bit executable
  • File is 64-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
Show More
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Assembly Version
  • 3.3.3.3
  • 2.2.2.2
  • 1.0.0.0
Comments
  • KROMASTICOSPRONATIVOS
  • TIMESCANASTRAONFIRES
  • Xoay text trong layout/model Autocad
Company Name
  • 0987606292
  • KROMASTICOSPRONATIVOS
  • TIMESCANASTRAONFIRES
File Description
  • KROMASTICOSPRONATIVOS
  • Rotate text in Layout/model Autocad
  • TIMESCANASTRAONFIRES
File Version
  • 3.3.3.3
  • 2.7.2.2
  • 1.0.0.0
  • 1.0
Internal Name
  • Bfnibxg.exe
  • Plex.dll
  • Rljaopbdsp.exe
  • Rmkbtgg.exe
  • RotateTextInViewport (RTV).dll
Legal Copyright
  • KROMASTICOSPRONATIVOS
  • TIMESCANASTRAONFIRES
  • ©2023 Hieuntvn@wru.vn 0987606292
Legal Trademarks
  • KROMASTICOSPRONATIVOS
  • TIMESCANASTRAONFIRES
Original Filename
  • Bfnibxg.exe
  • Plex.dll
  • Rljaopbdsp.exe
  • Rmkbtgg.exe
  • RotateTextInViewport (RTV).dll
Product Name
  • Hieuntvn
  • KROMASTICOSPRONATIVOS
  • TIMESCANASTRAONFIRES
Product Version
  • 3.3.3.3
  • 2.7.2.2
  • 1.0.0.0
  • 1.0

File Traits

  • .NET
  • dll
  • GenKrypt
  • HighEntropy
  • Reactor
  • RijndaelManaged
  • x64
  • x86

Block Information

Total Blocks: 55
Potentially Malicious Blocks: 2
Whitelisted Blocks: 48
Unknown Blocks: 5

Visual Map

? 0 0 0 ? ? 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 ?
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • MSIL.Agent.GOE
  • MSIL.Agent.ONH
  • MSIL.AgentTesla.DH
  • MSIL.AgentTesla.PH
  • MSIL.Bulz.KA
Show More
  • MSIL.Downloader.PFA
  • MSIL.Downloader.PFB
  • MSIL.Krypt.GEFT
  • MSIL.Krypt.GJLD
  • MSIL.Kryptik.SC
  • MSIL.Mardom.AJ
  • MSIL.Mardom.AY
  • MSIL.Mardom.TJA
  • MSIL.Quasar.BV
  • MSIL.Quasar.I
  • MSIL.Stealer.PAE
  • MSIL.Stealer.PHE

Files Modified

File Attributes
\device\namedpipe\dav rpc service Generic Read,Write Data,Write Attributes,Write extended,Append data
\device\namedpipe\pshost.134185330248234952.7968.defaultappdomain.powershell Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288
\device\namedpipe\wkssvc Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\__psscriptpolicytest_tnd5mpnd.ir3.ps1 Generic Write,Read Attributes
c:\users\user\appdata\local\temp\__psscriptpolicytest_uvfuwcop.sfm.psm1 Generic Write,Read Attributes
c:\users\user\appdata\roaming\e4dfc0763e86f9d295c8e10947363577b4c14f7e_0000356352 Generic Write,Read Attributes

Registry Modifications

Key::Value Data API Name
HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe ॰쾍룘ǜ RegNtPreCreateKey

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAccessCheck
  • ntdll.dll!NtAlertThreadByThreadId
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtClose
  • ntdll.dll!NtConnectPort
  • ntdll.dll!NtCreateEvent
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateMutant
  • ntdll.dll!NtCreateSection
Show More
  • ntdll.dll!NtCreateSemaphore
  • ntdll.dll!NtDuplicateObject
  • ntdll.dll!NtDuplicateToken
  • ntdll.dll!NtEnumerateValueKey
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenProcessTokenEx
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenSemaphore
  • ntdll.dll!NtOpenThreadTokenEx
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtQueryWnfStateData
  • ntdll.dll!NtReleaseMutant
  • ntdll.dll!NtReleaseSemaphore
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtRequestWaitReplyPort
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtSubscribeWnfStateChange
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtUnmapViewOfSectionEx
  • ntdll.dll!NtWaitForAlertByThreadId
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWorkerFactoryWorkerReady
  • ntdll.dll!NtWriteFile
  • ntdll.dll!NtWriteVirtualMemory
  • UNKNOWN
  • win32u.dll!NtGdiBitBlt
  • win32u.dll!NtGdiCreateBitmap
  • win32u.dll!NtGdiCreateCompatibleDC
  • win32u.dll!NtGdiCreateDIBitmapInternal
  • win32u.dll!NtGdiCreateSolidBrush
  • win32u.dll!NtGdiDeleteObjectApp
  • win32u.dll!NtGdiExtGetObjectW
  • win32u.dll!NtGdiGetDCforBitmap
  • win32u.dll!NtGdiGetDCObject
  • win32u.dll!NtGdiGetDeviceCaps
  • win32u.dll!NtGdiRestoreDC
  • win32u.dll!NtGdiSaveDC
  • win32u.dll!NtGdiSelectBitmap
  • win32u.dll!NtGdiSetDIBitsToDeviceInternal
  • win32u.dll!NtUserBuildHwndList
  • win32u.dll!NtUserCallTwoParam
  • win32u.dll!NtUserCreateEmptyCursorObject
  • win32u.dll!NtUserCreateWindowEx
  • win32u.dll!NtUserDestroyWindow
  • win32u.dll!NtUserFindExistingCursorIcon
  • win32u.dll!NtUserGetAncestor
  • win32u.dll!NtUserGetClassInfoEx
  • win32u.dll!NtUserGetClassName
  • win32u.dll!NtUserGetDC
  • win32u.dll!NtUserGetGUIThreadInfo
  • win32u.dll!NtUserGetIconInfo
  • win32u.dll!NtUserGetIconSize
  • win32u.dll!NtUserGetImeInfoEx
  • win32u.dll!NtUserGetKeyboardLayout
  • win32u.dll!NtUserGetObjectInformation
  • win32u.dll!NtUserGetProcessWindowStation
  • win32u.dll!NtUserGetProp
  • win32u.dll!NtUserGetThreadDesktop
  • win32u.dll!NtUserGetThreadState
  • win32u.dll!NtUserGetWindowCompositionAttribute
  • win32u.dll!NtUserIsNonClientDpiScalingEnabled
  • win32u.dll!NtUserIsTopLevelWindow
  • win32u.dll!NtUserMessageCall
  • win32u.dll!NtUserRegisterClassExWOW
  • win32u.dll!NtUserRegisterWindowMessage
  • win32u.dll!NtUserReleaseDC
  • win32u.dll!NtUserRemoveProp

6 additional items are not displayed above.

User Data Access
  • GetUserDefaultLocaleName
  • GetUserName
  • GetUserNameEx
  • GetUserObjectInformation
Encryption Used
  • BCryptOpenAlgorithmProvider
  • CryptAcquireContext
Anti Debug
  • IsDebuggerPresent
  • NtQuerySystemInformation
Other Suspicious
  • AdjustTokenPrivileges
Network Winsock2
  • WSAConnect
  • WSASocket
  • WSAStartup
  • WSAttemptAutodialName
Network Winsock
  • closesocket
  • freeaddrinfo
  • getaddrinfo
  • setsockopt
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess

Shell Command Execution

"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'e4dfc0763e86f9d295c8e10947363577b4c14f7e_0000356352'

Trending

Most Viewed

Loading...