PUP.MSIL.TelegramBot
Table of Contents
Analysis Report
General information
| Family Name: | PUP.MSIL.TelegramBot |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
023fe20df32b5284505e866d831f1e49
SHA1:
45ecb33cee7f45ef2f4f5eef24888f7546ed0569
File Size:
572.42 KB, 572416 bytes
|
|
MD5:
64cdd68f5c4819196892855caf32d749
SHA1:
bd44b1d96a5eb73278994069872cee5e5a798c67
File Size:
2.28 MB, 2277888 bytes
|
|
MD5:
35022b33e1bdbbce4eb89b00a7d5a3b9
SHA1:
36ee1b4b1ae20843d443c21ace9dac22cadd420b
File Size:
1.47 MB, 1465856 bytes
|
|
MD5:
4fb8d1fb3cc998e29e57a1cd17e1911e
SHA1:
d7e52f398c31622834423b1d5911027dc06107c9
File Size:
956.93 KB, 956928 bytes
|
|
MD5:
d0369e9eae7586daec801bdfd874271e
SHA1:
5da4985338507d5fe6bf9c3f0c98871d21aebd41
SHA256:
2E0B07ABBC7325812F5438B345EF31A84481FFD4D74F0E7D5CC07E1C27D0C46F
File Size:
146.43 KB, 146432 bytes
|
Show More
|
MD5:
bba2b5bdfacf566f362d1d2459651dc5
SHA1:
670d85524f6327c705ed3bde1ba18f8683a18a74
SHA256:
BF5B967E006A34A93535D8F1FBBA216861AD71CB5825C637620F986780623E31
File Size:
7.51 MB, 7508992 bytes
|
|
MD5:
caacb16dbc66029a1116d1cfbe313795
SHA1:
e9317bc7b9ec8073ae16c7dfebbb07d4f7cd7db8
SHA256:
8C60C79BA7460914C6AE6E683333A459897961312EAE85CE59EB74B949FD2BEE
File Size:
908.80 KB, 908800 bytes
|
|
MD5:
aaf01e620cfffa5b22721e853ea073f3
SHA1:
5c1ffa7b88cc30937f0104f479684fe0a9acdea0
SHA256:
D039A5936BBD1C0AB5F91F2FB1578445FC6B07DBB80137C7735BC40FA0FE3D3E
File Size:
113.66 KB, 113664 bytes
|
|
MD5:
eb36783b3d956ed8795b2cc0302541bb
SHA1:
5341a0b1272a87e3b85e55462688e64e99e7d190
SHA256:
3509B8624E584781D2C570362D1903B066DAFF7B882F1F197A25444C659E7934
File Size:
146.43 KB, 146432 bytes
|
|
MD5:
8cf36d6595aee3846104d6f2e128e259
SHA1:
8f9e48086c496fa39c63f944a49d50b5e0268336
SHA256:
9868DE72EDA076E3E2253CC24007010A03BD89B046656AA9D38D79D888E5491F
File Size:
499.71 KB, 499712 bytes
|
|
MD5:
ff39289d7237b5e4e49b1fb127355f44
SHA1:
4b6376d4dc19d0ac4d79b8e4ebd9afb2f9f1e325
SHA256:
0CD4CB3313B0ACF34DCC4978CE3C755FF626C90DCB7B1A726C3C83A8D75E04C3
File Size:
539.65 KB, 539648 bytes
|
|
MD5:
3536e795fb901b5795b65766f19f2165
SHA1:
087fe59b2034a0f560832d8b982d897808b00b8d
SHA256:
59271062084592308BE7B72E32C2EB50656D1D1405F09201DFAEB612CDABA17D
File Size:
87.55 KB, 87552 bytes
|
|
MD5:
bad5edb954884a5d0402fb46c1ce636c
SHA1:
0c9cc3fedddff17776a7949c91fa14dda0607aca
SHA256:
CC95FC16B937048543926B30B6158DC84C4F7D596691C4C243541197AF332E38
File Size:
9.08 MB, 9076224 bytes
|
|
MD5:
61c20cdd5528062e80bb5d7c25b5eac5
SHA1:
e57df994d59bcdb67242ba8892d1edcc20915eef
SHA256:
0D180A4DF0E2DB8C00A45B2D1564497BFAAD53B279ECB3908DA8B01AC8B135B9
File Size:
60.93 KB, 60928 bytes
|
|
MD5:
e96800a395a6eacabd0b16812a95691a
SHA1:
204470441756bd2e8ed800236e6d9a50746c3f45
SHA256:
7ED1C6EEA03F79277553A4C77B94FF94E51AF1B9BF785D7D29BFC3DCC4DADC4E
File Size:
228.35 KB, 228352 bytes
|
|
MD5:
ced516928767324d8f44e7f369912f52
SHA1:
c07ef6a5d65b98cf7f94ffb6282d14b10ccdd80e
SHA256:
A4BA4976A0F02FAF2E0F5339A5B16373441308464EA709B1462894E094E0FE4C
File Size:
901.63 KB, 901632 bytes
|
|
MD5:
6bccb953431c3bb607ec8e57f8e6786e
SHA1:
d5f59799b47415e372c552f2d906c2faf606f696
SHA256:
40DC9B1B3D2FD225A020C90C09899E131351C03D619B24B0C5943F1838C99979
File Size:
7.90 MB, 7900754 bytes
|
|
MD5:
db23692019e59acd9e729cac8864baae
SHA1:
571d60abcc665377f52fbe51079e9b6b8250017d
SHA256:
1E505D579C0A1634270945D17380EA95F5C3F9E92A00C3DCF02892A59BD8EC21
File Size:
7.28 MB, 7281152 bytes
|
|
MD5:
2edbb9b78c31227533c6301239abb135
SHA1:
8ec974d68a2279eccb27827d7479592c9a560e13
SHA256:
F499FF53B30D7D8015AFC24AC9B1AC1B93553FA82E0164FD7D4E6FE4674A1372
File Size:
12.80 KB, 12800 bytes
|
|
MD5:
3e2115c30afed03381b14b78fadeaf22
SHA1:
2bfc5685ad1e235904349cc809426407edde8d0f
SHA256:
E7EF7E912D0F773CE305F9EF32FF5581BD7306AE06C9DBB4433A802B0694F42C
File Size:
1.19 MB, 1187840 bytes
|
|
MD5:
1b0eba204e4a3fc41e1deb247b4c3131
SHA1:
3474b02d48f23bb78d4891d7a7e33edd1887b327
SHA256:
9D291DCD01692E9AD9C6910FFB3C3E7BBA9D6B6D5BE1EC822BE3A681E7C6072F
File Size:
2.10 MB, 2104320 bytes
|
|
MD5:
e756cf58bd7b77a7efe1f7c34da81ceb
SHA1:
9f9167a7e61cea0884c66bb3047eeabd0f9a5271
SHA256:
55598A1099C57B39F0379A71C9EB06D72DF93A2C14A87F88CA8E95825A87BE08
File Size:
150.53 KB, 150528 bytes
|
|
MD5:
e5bc1c910af84fe237803f14ed60d451
SHA1:
812f4781e81195c1b8c99803e73508432dfefbd0
SHA256:
9A066A6ADE9754567C0F97B8F9965F2B3D7F8CCD3749CB8FA041269268D70659
File Size:
1.21 MB, 1207808 bytes
|
|
MD5:
885d9ee0e8a343510e51ce47210882a7
SHA1:
0da4315419d87e7170ee2170f86aceffae615463
SHA256:
3B77009061AADA5FCEA6264F5BCEAA6EBCA439FC24F771C6676B896F3F85F303
File Size:
293.38 KB, 293376 bytes
|
|
MD5:
7c2418e934f126075c6b5d50138db82b
SHA1:
459e42998c15d13247eb833466b9b1394beacfaf
SHA256:
2D8EF16FA6E8C38600CE1CC65A84527475DF785D3A047B464037BCE022F7679D
File Size:
2.83 MB, 2831872 bytes
|
|
MD5:
152d1f656f389663e450fec4fef6b014
SHA1:
1f84613f108781c3a437b578b8d4400199e69dc4
SHA256:
86F71C081E208F7B4546463265B4730D187CE973B8060B2B6570DB112EA4497D
File Size:
901.63 KB, 901632 bytes
|
|
MD5:
98905f1e588b42443f60506d28a610c8
SHA1:
cf5d87721d4da6dd86ec74d6d25b932aba0814c2
SHA256:
D6C1961F037F5C168DF20B82C3A79157B7361D6E3248502BF081E24EB9347458
File Size:
140.80 KB, 140800 bytes
|
|
MD5:
3899c31572a13e95b08befa3f711845d
SHA1:
7d480b994974cb642a7ab45e01b444bb7c045327
SHA256:
66776A17BB01DF581DFAF98317C69773994CC8E5B38DFFDB7F40AB9DBA9FE08D
File Size:
895.49 KB, 895488 bytes
|
|
MD5:
56f5ded4ed0113cfcc8555140bdbb011
SHA1:
76d4a8b4079c5ef78e73ae992bc5eb10f54e741b
SHA256:
7D18E096A64D0ADE0C0D36D5555532E482873AD7F6A5535178546E675B777A7E
File Size:
73.73 KB, 73728 bytes
|
|
MD5:
1326d19669e26dde652e7f681d216082
SHA1:
dda704702938804e76cecbdd29d6318c35bb31b2
SHA256:
F8B95D4A2DC8CD31412EEDBB98BF21B6A4D55B66CF5528A36FB4475975CD35C2
File Size:
585.73 KB, 585728 bytes
|
|
MD5:
421528d7d5df56b459c79c00236f387d
SHA1:
cf20cf14401ff2e2329e4c5d7ed4bb0faa30d964
SHA256:
962834438C9BCA7FDD60F7D79BC0C634736C437CC33D1A6DBCAE7B753EA79320
File Size:
64.00 KB, 64000 bytes
|
|
MD5:
9d6dbfb04d6cc126b2342145d74fc933
SHA1:
bea2fe7f01e1cb00fe739ca63b120a752dfdfb69
SHA256:
A812FEBCD7900E247E7A8964CFCF50D4172B3E66C961A1C7EAF48C09F82A176A
File Size:
826.88 KB, 826880 bytes
|
|
MD5:
4d5e26b7639a1ae4fe73949a3dc9d24b
SHA1:
a4545194fa432c508702d6213e94a7ead944129b
SHA256:
375EEA942495CD6B3F4B982D24540168C1C18281F1AECDD8DE4DF2DA300C03FF
File Size:
4.13 MB, 4129280 bytes
|
|
MD5:
bc93a376292d3622a3d9dd75918198a5
SHA1:
76cd93500fc1ecd93308e390a5564e1b406c7059
SHA256:
86135566F4EFA46FE5232D5B1427251B94A0F4625E509F53BBB8156F0CDC82F4
File Size:
2.69 MB, 2685952 bytes
|
|
MD5:
2fdab31daa9aadb87e9b55b1f9fb7676
SHA1:
cd9b1ba48896b1d020cb90c3ed706188261d93fc
SHA256:
A20E9CC654FAA02B19AB3CC1E4304A9BE8EA26E008CF48EAB03E3BD5D6268EEA
File Size:
799.74 KB, 799744 bytes
|
|
MD5:
8fbfd084ec313991d372e613201580e2
SHA1:
bee73e2662afe6c8f94d60f8c5cc4593376cc1d4
SHA256:
9D8E1DACCFF1717A567F6258CA00482B1B4DCA9A2166DD413545C5C5BC2F044C
File Size:
2.83 MB, 2830336 bytes
|
|
MD5:
7e9e6e4e5e463542e1947d229d859b4d
SHA1:
8cec282f61c0088066eae13102b820088621ebb8
SHA256:
EDED78BF477A1603987F36EE18DD109D32F97A951DCCDDA231AB70CF510FB9F4
File Size:
164.34 KB, 164336 bytes
|
|
MD5:
41348d1959e50b93eb8e4510518bc49f
SHA1:
526a123c80a5fd46048ebbd82222ff421363cd15
SHA256:
C196260902D3AAAFE1D44A1B4E54A049D5FA7300A7C7991C5766C7D99B0E317C
File Size:
1.72 MB, 1717760 bytes
|
|
MD5:
9bad89a7ea4688573c65b5fdcbf8c2a4
SHA1:
3a14af0965ba88be929af2283a2f4ca08d7f60bd
SHA256:
EB423674D37546BF2ABCF7DE428EED290BBB5D52EF2F275A6B6F793EA85C2CDF
File Size:
2.81 MB, 2806272 bytes
|
|
MD5:
76d6ab5b2bacd8a5493c4ab3d9c58c47
SHA1:
edfaa6b7be7d2e460f05a8a0a5274f1980c14ca1
SHA256:
5A3984296CE870B88AB835368111919F5CC179B4B94B6D66C184DD9A34DC1490
File Size:
2.98 MB, 2982400 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File has TLS information
- File is .NET application
- File is 32-bit executable
- File is 64-bit executable
- File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
Show More
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Show More
Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Assembly Version |
Show More
|
| Comments |
|
| Company Name |
Show More
|
| File Description |
Show More
|
| File Version |
Show More
|
| Internal Name |
Show More
|
| Legal Copyright |
Show More
|
| Legal Trademarks |
|
| Original Filename |
Show More
|
| Product Name |
Show More
|
| Product Version |
Show More
|
File Traits
- .NET
- Agile.net
- Fody
- HighEntropy
- Installer Version
- NewLateBinding
- ntdll
- RijndaelManaged
- Run
- SmartAssembly
Show More
- Stealer
- WriteProcessMemory
- x64
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 3,636 |
|---|---|
| Potentially Malicious Blocks: | 28 |
| Whitelisted Blocks: | 1,719 |
| Unknown Blocks: | 1,889 |
Visual Map
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
0
?
?
0
0
?
?
0
0
0
0
?
?
0
?
0
?
0
0
0
?
?
0
?
0
?
?
?
0
?
0
?
?
?
0
?
0
?
0
0
0
0
0
?
?
0
?
0
?
?
?
0
?
0
?
?
?
0
?
0
0
0
0
?
?
0
?
?
?
?
?
?
0
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
0
?
?
?
?
?
?
?
?
?
?
?
0
?
0
?
?
?
?
0
?
?
?
0
?
0
?
?
?
0
?
0
?
?
?
0
?
0
?
?
?
?
?
?
?
0
?
?
?
0
?
0
?
?
0
?
0
0
?
0
?
0
0
?
0
?
0
0
?
0
?
0
0
?
?
?
0
?
0
0
?
?
?
?
?
?
?
?
?
0
?
0
0
?
?
?
?
?
?
?
?
?
0
?
0
0
?
?
?
?
?
?
?
?
0
0
?
0
?
0
0
?
?
?
0
?
0
?
0
?
0
?
0
0
0
0
0
?
0
?
0
0
0
?
0
?
0
0
0
?
?
0
0
0
0
?
0
0
0
?
0
?
0
0
0
?
?
0
0
?
?
?
?
?
?
?
?
0
x
?
?
?
?
0
?
0
0
?
0
0
?
0
0
0
?
?
0
0
0
0
0
0
?
0
0
0
0
0
?
?
0
0
0
?
?
0
?
?
?
0
?
?
?
?
?
?
?
?
0
0
?
0
?
0
?
?
?
0
?
?
?
?
?
0
0
0
?
?
0
?
?
?
0
?
0
?
?
0
?
?
?
?
?
0
0
?
0
x
?
0
0
?
0
0
0
0
?
0
0
0
0
0
0
?
0
0
0
0
0
0
0
?
0
0
0
0
0
?
0
0
0
0
0
?
0
0
0
0
0
0
0
0
?
0
0
0
0
0
0
0
?
0
0
0
0
?
0
0
0
?
0
0
0
0
x
0
0
0
0
0
x
0
0
0
x
0
0
0
0
0
0
0
0
?
?
0
0
0
?
0
0
0
0
0
?
x
0
?
?
0
0
0
0
?
0
0
0
0
0
0
0
0
0
x
?
?
?
?
?
?
?
?
?
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
?
0
0
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
?
0
x
0
0
0
0
0
0
?
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
?
0
0
?
?
?
0
0
0
?
0
?
0
?
0
?
?
0
?
?
?
?
?
?
?
?
?
?
0
0
0
0
0
0
0
0
0
0
?
?
?
?
?
?
?
0
0
0
0
?
0
0
0
?
0
?
0
0
0
0
0
0
0
0
0
0
?
0
0
0
?
0
0
0
0
?
?
0
0
?
?
?
?
0
0
?
?
0
?
0
?
0
0
0
?
0
0
0
0
0
0
0
0
0
0
0
?
?
0
?
0
0
?
?
?
?
?
?
?
?
0
0
0
0
0
?
0
0
0
0
0
0
0
0
0
0
0
0
?
?
?
?
0
0
0
?
0
?
?
0
0
?
?
?
?
?
?
?
?
?
0
?
?
?
?
?
?
?
0
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
0
?
?
?
?
?
?
0
?
0
0
0
0
0
0
0
0
?
0
0
?
0
0
0
0
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
?
?
0
0
0
?
?
?
?
?
?
?
?
0
?
?
?
?
?
?
?
?
?
?
?
?
0
?
0
?
0
0
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
0
?
0
?
0
0
?
?
?
?
?
?
?
?
?
?
?
?
?
0
?
?
?
?
?
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
?
?
?
?
?
0
?
?
?
0
0
0
0
0
0
0
0
0
0
0
0
?
?
?
?
?
?
?
?
?
?
?
?
?
0
?
?
?
?
0
?
?
?
?
0
?
?
?
?
0
?
?
?
0
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
?
?
?
?
?
?
0
0
0
0
?
?
?
?
?
?
?
?
?
?
?
?
0
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
0
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
?
0
?
?
0
0
0
?
?
?
?
?
?
0
0
?
?
?
?
?
?
x
?
?
0
x
?
?
?
?
?
?
0
?
?
?
?
?
0
?
?
?
?
?
?
?
?
0
0
0
?
0
?
?
0
0
?
?
?
?
0
?
?
?
?
?
?
?
0
?
?
?
?
?
?
?
?
?
0
0
0
?
0
0
0
?
0
?
0
?
?
?
?
?
?
?
0
0
0
0
0
0
0
0
0
0
0
0
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
0
?
0
0
0
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
0
?
?
?
0
?
?
?
?
?
?
?
?
?
?
?
?
0
?
?
?
?
?
?
?
?
?
x
0
0
0
0
0
x
?
?
?
?
?
?
0
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
0
x
?
?
?
?
?
?
?
?
?
?
?
?
0
0
x
?
?
x
x
0
?
?
?
0
?
?
?
?
?
0
0
0
0
?
?
?
0
0
?
?
?
?
0
?
?
0
0
?
?
?
0
?
0
?
0
?
0
0
?
?
0
0
0
0
0
?
?
?
?
?
?
?
0
0
0
0
?
?
?
0
?
?
0
?
?
0
?
0
?
?
?
?
?
?
0
0
0
?
?
0
0
0
0
?
0
?
?
0
?
0
0
?
0
0
0
0
0
0
0
?
?
?
?
?
?
0
0
?
0
?
0
0
0
0
0
?
0
?
0
?
0
0
0
?
?
?
?
?
0
?
?
0
?
?
?
0
0
0
0
0
0
0
0
?
0
0
0
0
0
0
0
0
0
?
0
0
?
0
0
0
0
0
?
?
0
0
?
0
?
0
0
0
?
0
?
0
?
0
?
0
?
0
?
0
?
0
?
0
?
0
?
0
?
0
?
0
?
0
?
0
?
0
?
0
?
0
?
0
?
0
?
0
?
0
0
0
0
?
0
?
0
?
?
?
?
?
0
?
0
?
0
0
0
?
0
0
0
0
x
0
?
?
?
?
?
?
0
?
0
?
?
0
?
0
?
0
?
0
?
0
0
0
?
?
?
?
?
?
?
?
?
?
?
?
?
0
?
?
?
0
0
0
?
?
?
?
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
0
0
0
?
?
0
?
0
?
0
?
x
0
0
?
0
?
0
?
?
0
?
?
0
?
0
0
0
?
0
0
?
0
?
?
0
0
x
?
?
?
0
?
0
0
?
0
?
?
0
0
?
?
?
0
?
?
0
0
?
?
?
?
?
0
0
0
0
0
?
?
?
0
0
?
0
0
0
0
?
0
0
0
0
?
0
0
?
0
0
?
?
?
?
?
0
?
?
?
0
0
0
0
?
?
0
0
0
?
?
?
?
0
0
0
0
0
0
?
0
0
?
?
0
0
?
0
?
0
?
0
?
0
0
?
0
0
?
0
?
?
0
?
0
?
0
?
0
?
0
?
0
0
0
?
0
0
?
0
?
0
?
0
?
0
?
0
?
0
?
0
?
0
?
0
0
0
0
0
?
?
?
?
?
0
?
?
?
?
0
?
?
?
?
0
?
?
?
?
?
0
?
?
0
0
?
x
0
?
?
?
?
?
?
?
0
?
?
0
0
0
0
?
0
0
?
0
?
?
?
0
?
0
0
0
?
0
?
0
?
?
?
?
0
0
?
0
0
0
0
?
?
?
0
0
?
?
?
0
?
?
?
?
?
?
?
0
?
?
0
0
0
?
0
?
?
0
0
?
0
0
0
0
0
0
0
?
?
0
0
0
?
0
0
0
0
0
?
0
?
0
?
0
?
0
?
0
?
0
?
0
?
0
0
?
?
0
?
?
0
0
?
?
0
0
0
0
?
0
0
?
0
0
?
?
0
0
0
0
0
?
0
0
0
0
0
?
?
?
0
...
Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- MSIL.Agent.DGY
- MSIL.Agent.FGI
- MSIL.Agent.KS
- MSIL.Agent.SFT
- MSIL.Agent.XX
Show More
- MSIL.HackAgent.XD
- MSIL.Spy.DC
- MSIL.TelegramBot.O
- MSIL.TelegramBot.U
- MSIL.TelegramBot.UA
- RatSharp.B
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe | Generic Read,Write Attributes |
| \device\namedpipe | Generic Write,Read Attributes |
| \device\namedpipe\dav rpc service | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| \device\namedpipe\pshost.134062039633893394.5564.defaultappdomain.powershell | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\wkssvc | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\programdata\update.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\microsoft\windows\usrclass.dat{dba6b5ef-640a-11ed-9bcb-f677369d361c}.txr.0.regtrans-ms | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\microsoft\windows\usrclass.dat{dba6b5ef-640a-11ed-9bcb-f677369d361c}.txr.1.regtrans-ms | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\microsoft\windows\usrclass.dat{dba6b5ef-640a-11ed-9bcb-f677369d361c}.txr.2.regtrans-ms | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_3t2md4gk.eqn.ps1 | Generic Write,Read Attributes |
Show More
| c:\users\user\appdata\local\temp\__psscriptpolicytest_qph34dip.xrb.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\edgewebview\drpsm5ta-qnkxcajh.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\edgewebview\msedgewebview2.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\users\user\appdata\local\temp\edgewebview\msedgewebview2.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\tmp5262.tmp.cmd | Generic Write,Read Attributes |
| c:\users\user\downloads\5c1ffa7b88cc30937f0104f479684fe0a9acdea0_0000113664 | Synchronize,Write Attributes |
| c:\users\user\downloads\config\translations\translation.en.json | Generic Write,Read Attributes |
| c:\users\user\downloads\logs\necrobot-2025-12-13-21.txt | Generic Write,Read Attributes |
| c:\users\user\downloads\logupdate.txt | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\downloads\logupdate.txt | Generic Write,Read Attributes |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 뱦䁾⡡ǜ | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\run::updatedrica | c:\users\user\downloads\4b6376d4dc19d0ac4d79b8e4ebd9afb2f9f1e325_0000539648 | RegNtPreCreateKey |
| HKLM\software\wow6432node\microsoft\windows\currentversion\run::updatedrica | c:\users\user\downloads\4b6376d4dc19d0ac4d79b8e4ebd9afb2f9f1e325_0000539648 | RegNtPreCreateKey |
| HKLM\software\wow6432node\microsoft\tracing::enableconsoletracing | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasapi32::enablefiletracing | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasapi32::enableautofiletracing | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasapi32::enableconsoletracing | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasapi32::filetracingmask | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasapi32::consoletracingmask | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasapi32::maxfilesize | RegNtPreCreateKey |
Show More
| HKLM\software\wow6432node\microsoft\tracing\rasapi32::filedirectory | %windir%\tracing | RegNtPreCreateKey |
| HKLM\software\wow6432node\microsoft\tracing\rasmancs::enablefiletracing | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasmancs::enableautofiletracing | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasmancs::enableconsoletracing | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasmancs::filetracingmask | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasmancs::consoletracingmask | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasmancs::maxfilesize | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasmancs::filedirectory | %windir%\tracing | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 㫚海䢶ǜ | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
25 additional items are not displayed above. |
| User Data Access |
|
| Anti Debug |
|
| Encryption Used |
|
| Other Suspicious |
|
| Process Manipulation Evasion |
|
| Process Shell Execute |
|
| Keyboard Access |
|
| Network Info Queried |
|
| Network Winsock2 |
|
| Network Winsock |
|
| Network Winhttp |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
"C:\Users\Gmvwsama\AppData\Local\Temp\EdgeWebView\msedgewebview2.exe"
|
"C:\Users\Gmvwsama\AppData\Local\Temp\tmp5262.tmp.cmd"
|
"schtasks.exe" /create /tn "msedgewebview2" /tr "C:\Users\Gmvwsama\AppData\Local\Temp\EdgeWebView\msedgewebview2.exe" /st 22:59 /du 23:59 /sc daily /ri 1 /rl HIGHEST /f
|
C:\WINDOWS\system32\timeout.exe timeout 6
|
"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "\r\nGet-ScheduledTask -TaskPath '\' | Where-Object { $_.TaskName -match '^OneDriveReportingTask-[a-zA-Z0-9]{1,15}$' } | Select-Object -ExpandProperty TaskName\r\n"
|