Threat Database Trojans Trojan.Agent.AITA

Trojan.Agent.AITA

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 15,617
Threat Level: 80 % (High)
Infected Computers: 34
First Seen: November 17, 2022
Last Seen: February 15, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.Agent.AITA
Signature status: No Signature

Known Samples

MD5: 44fb138dc9da45e3863ba22e7428f362
SHA1: 1460eb3550f9d22ac5e5ca51f76a44ae3ad04e12
SHA256: 691EC6EEEDC5C1DFABBB271C2BF3D7E340AE91694CFEA6B770243774268DACA7
File Size: 2.27 MB, 2267648 bytes
MD5: 5aa4c5bcca5b3c48d095a75cb5608ae0
SHA1: 9e26549f7afb48bb6c106f98fa74303aa6665a20
SHA256: DB67515FC812AD245CBFAF0146143D42F62484581956705587CC66AECCB3A865
File Size: 3.98 MB, 3983360 bytes
MD5: ba688b24cc79eb2d50f41f214658e24d
SHA1: 59d0cddfb4f473985d4b315f0eb16e31095ca326
SHA256: EEBD04E66A3FF8B8D861CC23A6D857B8022B77C411264F927D0FEF4F1A983C3D
File Size: 813.06 KB, 813056 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have security information
  • File has exports table
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name 请点允许,软件误报请关闭杀毒软件-订做软件QQ:935960382
File Description 蒸汽游戏盒子大型3A游戏目录
File Version
  • 1.2
  • 1.0
  • 0.0.0.0
Internal Name
  • simpropace
  • 期限
  • 游戏盒子_名称
Legal Copyright (C) 版权所有
Original Filename
  • simpropace.dll
  • 期限.exe
  • 游戏盒子_名称.exe
Product Name
  • C++应用程序
  • 期限
Product Version
  • 1.2
  • 1.0
  • 0.0.0.0

File Traits

  • dll
  • fptable
  • HighEntropy
  • imgui
  • x86

Block Information

Total Blocks: 925
Potentially Malicious Blocks: 219
Whitelisted Blocks: 579
Unknown Blocks: 127

Visual Map

? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x x x x x ? ? ? x x x x x x x x x x x ? ? x x 0 x x x x x 0 0 x x ? x x x x x x x 0 0 x x x x x x ? x ? ? x x x ? x ? x 0 ? 0 ? ? ? 0 ? x x x x ? ? ? x x 0 ? ? 0 0 x x x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x x x 0 x x x x x x x x x x x x x x x x x 0 x x x x x x x 0 0 x x x x x x x x ? ? x x x x ? ? x x ? x x ? x x ? x ? x ? ? ? ? x ? 0 0 0 0 0 0 0 0 0 x x x ? ? x x x x x x x x x ? 0 ? 0 ? x x x x x 0 ? 0 x ? x x ? ? 0 x x x ? x x x x x x 0 x 0 0 ? x x ? x ? x ? x x x x x x ? ? 0 x x ? x ? x x x ? x 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0 2 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 1 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 2 0 2 2 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 2 0 3 1 1 0 1 1 2 1 0 0 0 0 0 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ?
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Agent.AITA
  • Agent.FRFD
  • Farfli.NB
  • Lotok.F
  • NetWiredRC.D
Show More
  • Rugmi.GI

Files Modified

File Attributes
c:\programdata\presonus\xt\studio one.dll Generic Write,Read Attributes

Windows API Usage

Category API
Anti Debug
  • IsDebuggerPresent
  • NtQuerySystemInformation
User Data Access
  • GetUserObjectInformation
Other Suspicious
  • SetWindowsHookEx
Network Wininet
  • HttpOpenRequest
  • HttpQueryInfo
  • HttpSendRequest
  • InternetConnect
  • InternetOpen
  • InternetReadFile
Network Winhttp
  • WinHttpOpen
Syscall Use
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtQueryAttributesFile
Show More
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWriteFile
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess

Shell Command Execution

C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\59d0cddfb4f473985d4b315f0eb16e31095ca326_0000813056.,LiQMAxHB

Trending

Most Viewed

Loading...