Trojan.Agent.DFDE
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.Agent.DFDE |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
11d6f093b4afe4a02fc5c4665d11f807
SHA1:
d2c5efa922967144aa7367ef0eaded26b9105e31
SHA256:
51EDC22724C2A686F740D8B1FDCA29F61BEA5B4378FE042980CEEE5D401F8530
File Size:
111.05 KB, 111049 bytes
|
|
MD5:
119350e4d83b0cc85bdab8b6cec168f4
SHA1:
07c17d3282af617a53d1e97c7963210fb93ea730
SHA256:
9555D97F8079A7B61881D478081097A2CB2B6C4B2DC7EF06B42FD3522577C5D3
File Size:
2.23 MB, 2225828 bytes
|
|
MD5:
ab162879fabf5213a1d21c47a319d2cc
SHA1:
9b01547719891ebbe773a9d97473277e64187c1b
SHA256:
7A9F39AEE2DE7DD59DA9484F7D25A6B9F9225426ED27ADFF7796388A2C46E537
File Size:
2.23 MB, 2225340 bytes
|
|
MD5:
3831fb347d7e092efb66d9e6d33ef3cc
SHA1:
9e84c2f2a1378cc0fe36a1ab3588a85fc4f08726
SHA256:
0D86F137943B32C91C06427F32F40E5DCC036C2F5ECDB59F66D04BEE8949A200
File Size:
2.21 MB, 2212409 bytes
|
|
MD5:
ff0a3860ae893628fc9852835ad4c118
SHA1:
db096f68567b157b0ef6a1d28feb1fe38f9f377f
SHA256:
51C863ADCA0AC2847D6C56166CC33ECB36639454D06343FD041AB2D000475277
File Size:
2.22 MB, 2222104 bytes
|
Show More
|
MD5:
287fd707268be5b65fe204d71fcaec3d
SHA1:
492051072607fbeccda8e5b0e11543c21b4b11b0
SHA256:
0973A309D22C86BAD662366CDC7DA9D935536B3BEF2C1351F5838AC083BA3AEE
File Size:
65.81 KB, 65807 bytes
|
|
MD5:
e4e5040cd4f3756748ee45be1fb8d946
SHA1:
1e1ecfcccc481e2c8eda351cd76109a93dbf52c4
SHA256:
79FC11B3538287F1CCE486743891661A142EAF8EB3DD7E7F97993008BD62C909
File Size:
101.89 KB, 101886 bytes
|
|
MD5:
0c486ec8601cefe5d83ec991c90ac99c
SHA1:
bf7f5c1d4055ab678ff7f692f37b82489bfdd4b1
SHA256:
8D92B6CBBFDB0B5E2736F4299E38E3BCCB30B6769EA58B4A1809B45C23F4C85A
File Size:
771.07 KB, 771072 bytes
|
|
MD5:
93d0db88db9d2305ddba8017b299e0f1
SHA1:
a785fcc2d5a4c9736621c6f75436f2114f017b05
SHA256:
7DAFED647EC8CBF5F43AF1832AE8E9FECD9169CC9466CCB2DE5E98CA9A6221F7
File Size:
2.22 MB, 2222104 bytes
|
|
MD5:
ca322d1293404e760677433e249bd747
SHA1:
b53c9287227d8c43915fad9dc2d2a0f9573371d0
SHA256:
4C666488FB473B35B36ED6D3383FB74FC8E078A3230C4314E218061B6909A0C4
File Size:
89.50 KB, 89503 bytes
|
|
MD5:
b533262b3d85b4f2e92f59c45da3e7ed
SHA1:
ce2731155e893280ab53eb58e47a2f4e79150da9
SHA256:
16B74AFC729EFCABF7FF2FC71984BFA9CB5F4A4BCE9967E7AB5BC0EBCC30E518
File Size:
992.26 KB, 992256 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have resources
- File doesn't have security information
- File has exports table
- File has TLS information
- File is 64-bit executable
- File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
Show More
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Company Name | SegaTools IDZHook |
| File Version |
|
| Legal Copyright | ©2020 djhackers & TeknoGods |
| Original Filename | idzhook.dll |
| Product Name | SegaTools IDZHook |
| Product Version |
|
File Traits
- big overlay
- dll
- x64
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 1,518 |
|---|---|
| Potentially Malicious Blocks: | 2 |
| Whitelisted Blocks: | 896 |
| Unknown Blocks: | 620 |
Visual Map
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
0
0
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
0
0
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
?
0
?
?
?
?
?
?
0
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
0
0
0
?
?
?
?
?
?
0
0
0
0
0
0
?
?
?
?
?
?
0
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
0
?
?
?
?
?
?
0
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
0
?
?
?
?
?
?
?
?
?
?
0
?
?
0
0
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
0
?
?
?
?
0
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
0
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
0
?
?
?
?
0
0
0
0
?
?
0
?
0
?
?
?
?
?
?
0
?
?
?
?
?
?
?
?
0
0
?
?
?
?
0
0
?
?
?
?
?
?
?
?
?
0
?
?
?
?
?
?
?
0
?
?
?
0
?
?
0
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
?
?
0
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
0
0
0
?
?
?
?
?
?
?
0
0
?
?
?
?
0
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
0
?
?
?
?
0
0
?
0
?
?
?
?
?
?
?
?
?
?
?
0
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
x
?
?
x
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
0
0
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
0
0
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
0
0
?
?
?
?
?
?
?
?
?
?
?
?
0
?
?
?
?
0
0
?
?
?
?
0
?
0
?
0
?
?
?
?
?
?
?
?
?
0
?
?
0
0
0
?
?
0
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
0
0
?
?
?
?
?
?
0
?
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Agent.UFH
- Agent.XVI
- Metasploit.X
- ReverseShell.UA
- Trojan.Kryptik.Gen.BX
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | 沐 ⬉ʾ䈛x䠱O噀ñ傄ë횎ǜɼ鶝꾢ʊ閾ʴ淃⟋ʪߙĤ 鈄ĞꩠŖÉ | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
92 additional items are not displayed above. |