Threat Database Trojans Trojan.Agent.AITA

Trojan.Agent.AITA

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 14,157
Threat Level: 80 % (High)
Infected Computers: 39
First Seen: November 17, 2022
Last Seen: May 3, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.Agent.AITA
Signature status: No Signature

Known Samples

MD5: 44fb138dc9da45e3863ba22e7428f362
SHA1: 1460eb3550f9d22ac5e5ca51f76a44ae3ad04e12
SHA256: 691EC6EEEDC5C1DFABBB271C2BF3D7E340AE91694CFEA6B770243774268DACA7
File Size: 2.27 MB, 2267648 bytes
MD5: 5aa4c5bcca5b3c48d095a75cb5608ae0
SHA1: 9e26549f7afb48bb6c106f98fa74303aa6665a20
SHA256: DB67515FC812AD245CBFAF0146143D42F62484581956705587CC66AECCB3A865
File Size: 3.98 MB, 3983360 bytes
MD5: ba688b24cc79eb2d50f41f214658e24d
SHA1: 59d0cddfb4f473985d4b315f0eb16e31095ca326
SHA256: EEBD04E66A3FF8B8D861CC23A6D857B8022B77C411264F927D0FEF4F1A983C3D
File Size: 813.06 KB, 813056 bytes
MD5: 9b32aac1c21e3f0900aed28d61985250
SHA1: cd60cf500a19f85112bfac5e6609b8e62d9372d0
SHA256: 45839FD069B46C625D19ED8E25B152C7BAA814E3D2027E9FA833BA560BAA01B5
File Size: 5.62 MB, 5618688 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have security information
  • File has exports table
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name 请点允许,软件误报请关闭杀毒软件-订做软件QQ:935960382
File Description 蒸汽游戏盒子大型3A游戏目录
File Version
  • 1.2
  • 1.0
  • 0.0.0.0
Internal Name
  • simpropace
  • way
  • 期限
  • 游戏盒子_名称
Legal Copyright (C) 版权所有
Original Filename
  • simpropace.dll
  • way.exe
  • 期限.exe
  • 游戏盒子_名称.exe
Product Name
  • C++应用程序
  • 期限
Product Version
  • 1.2
  • 1.0
  • 0.0.0.0

File Traits

  • dll
  • fptable
  • HighEntropy
  • imgui
  • x86

Block Information

Total Blocks: 8,437
Potentially Malicious Blocks: 398
Whitelisted Blocks: 7,979
Unknown Blocks: 60

Visual Map

x 0 x 0 0 0 0 x ? ? ? ? 0 x x x x 0 x 0 0 0 x x x x x x x x x x x x 0 0 0 x x x x x x x x x x x x 0 0 x x x x x x x x x 0 x x 0 0 x x x x x 0 x x x 0 0 0 0 x x x x 0 0 x x x x x x x x x 0 0 0 x x x x x x x x x 0 0 x x x x x x x x x 0 0 x x x x x x x x 0 0 x x x x x x x x x 0 0 x x x x x x x x 0 0 x x x x x x x x x 0 0 x x x x x x x x x 0 0 x x x x x x x x x x 0 x x x x x x 0 x x x x x x x x x x x 0 0 x x x x x x x x x 0 0 x x x x x x x x 0 0 x x x x x 0 0 0 0 x x x x x x x x x x 0 x x x x x 0 x 0 0 0 x x x 0 0 0 0 0 x x x x x x x x 0 0 0 x x x x x x x x 0 0 x x x x x 0 0 x x x 0 0 0 x x x x x x x x 0 0 x x x x x x x x x x x x x 0 x x 0 0 x x x x x x x x ? x 0 x ? x x 0 0 0 0 x x x x x x x x x x ? ? x x x x x x x 0 0 x x x x ? x x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x x ? ? ? ? 0 x 0 0 x x x x x x x x x x 0 x 0 0 x 0 0 x x x x x x x x x x x x x 0 x x x x x x 0 0 0 x x x x x x x x x x x x x x x x x x x 0 0 0 0 x x x x x x x x x 0 0 x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x x x x x x 0 ? x x x x x x x x x 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Agent.AITA
  • Agent.FDJ
  • Agent.FRFD
  • Farfli.NB
  • Fragtor.AB
Show More
  • Fragtor.AI
  • Kryptik.REC
  • Lotok.F
  • Lumma.XC
  • NetWiredRC.D
  • Rugmi.GI

Files Modified

File Attributes
c:\programdata\clear\{s752ozp2qsn50rp2ujy}\0qesf.exe Generic Write,Read Attributes
c:\programdata\clear\{s752ozp2qsn50rp2ujy}\0qesf.txt Generic Write,Read Attributes
c:\programdata\clear\{s752ozp2qsn50rp2ujy}\httpsapi.dll Generic Write,Read Attributes
c:\programdata\clear\{s752ozp2qsn50rp2ujy}\log.dll Generic Write,Read Attributes
c:\programdata\presonus\xt\studio one.dll Generic Write,Read Attributes

Windows API Usage

Category API
Anti Debug
  • IsDebuggerPresent
  • NtQuerySystemInformation
User Data Access
  • GetUserObjectInformation
Other Suspicious
  • SetWindowsHookEx
Network Wininet
  • HttpOpenRequest
  • HttpQueryInfo
  • HttpSendRequest
  • InternetConnect
  • InternetOpen
  • InternetReadFile
Network Winhttp
  • WinHttpOpen
Syscall Use
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtQueryAttributesFile
Show More
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWriteFile
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess

Shell Command Execution

C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\59d0cddfb4f473985d4b315f0eb16e31095ca326_0000813056.,LiQMAxHB
c:\users\user\downloads\cd60cf500a19f85112bfac5e6609b8e62d9372d0_0005618688 490A300A560A5A0A780A650A6D0A780A6B0A670A4E0A6B0A7E0A6B0A560A490A660A6F0A6B0A780A560A710A790A3D0A3F0A380A450A500A7A0A380A5B0A790A440A3F0A3A0A780A5A0A380A5F0A600A530A770A560A3A0A5B0A4F0A590A6C0A00
"C:\ProgramData\Clear\{s752OZp2QsN50rP2UjY}\0QESf.exe"

Trending

Most Viewed

Loading...