Threat Database Trojans Trojan.Agent.AIAN

Trojan.Agent.AIAN

By CagedTech in Trojans

Analysis Report

General information

Family Name: Trojan.Agent.AIAN
Signature status: No Signature

Known Samples

MD5: 2d86c59f442d667212cf3b69967fe891
SHA1: 0d686590ad41c4fff6323c1712f95eb58b628f99
SHA256: 6FB7CEFD67CEB6573E47E0401F90496FE6C7555C7969120158D65DEB1EE75A62
File Size: 291.84 KB, 291840 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

File Traits

  • HighEntropy
  • No Version Info
  • x86

Block Information

Total Blocks: 412
Potentially Malicious Blocks: 28
Whitelisted Blocks: 382
Unknown Blocks: 2

Visual Map

x 0 x x x ? 0 0 ? x x x x x 0 x x x x x x x x x x x x x x x x x x x 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 2 2 0 1 1 1 1 0 0 0 0 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
c:\users\user\appdata\local\temp\f鍍à‹4pýýçžìà.txt Generic Write,Read Attributes
c:\users\user\appdata\local\temp\–•m%äªë·ìâå±g ‚ú.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\users\user\appdata\local\temp\–•m%äªë·ìâå±g ‚ú.exe Synchronize,Write Attributes
c:\users\user\appdata\local\temp\–•m%äªë·ìâå±g ‚ú.txt Generic Write,Read Attributes
c:\users\user\appdata\local\temp\æ^"¼÷çay—c›,•bq.txt Generic Write,Read Attributes
c:\users\user\appdata\local\temp\çæêï0ƒöúqê\rìœc«.txt Generic Write,Read Attributes
c:\users\user\appdata\local\temp\ì,ï í†®¤óm®z.txt Generic Write,Read Attributes

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess

Shell Command Execution

C:\Users\Xqhweltt\AppData\Local\Temp\鲖粕慭蜥惄侪俋梷懬忢瓅纱灇萠枂黺.exe (NULL)

Trending

Most Viewed

Loading...