Trojan.Agent.ENA
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 284 |
| Threat Level: | 80 % (High) |
| Infected Computers: | 8,375 |
| First Seen: | July 5, 2024 |
| Last Seen: | April 16, 2026 |
| OS(es) Affected: | Windows |
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.Agent.ENA |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
0aa7bedfcaff37ec3869f0847c6490a0
SHA1:
b27fda4e652590dd110dc1c32abee4d8c084e9d3
File Size:
7.64 MB, 7638016 bytes
|
|
MD5:
3f7ac3831a7a4d231634dc5165400865
SHA1:
f1f7e01c2c788d37440cf0c16c177fa13e7c8710
SHA256:
A3161E0FEAA4942080E3A38E6030A9CF1609EEF863AD366172D3196F2316D0EB
File Size:
7.77 MB, 7771992 bytes
|
|
MD5:
32220f80a3e868ac505bc6e422c61ee5
SHA1:
9c9c6e9555b229a1687b9f0b836f2f4cf95d8666
SHA256:
9EE8CAA5F90F42D62D843AF18D75AFCE8600CCDED0F496A5EEFE629444F6BD7F
File Size:
7.85 MB, 7850080 bytes
|
|
MD5:
081093404258133ed30d27c63679a739
SHA1:
e5104761d1e7d5cc4bbf386736edad7c6c0eb00e
SHA256:
176816F4D19A67DD571971E26056B760F3D7BA1FD7B03880A0A42A377E27A3BA
File Size:
6.54 MB, 6539380 bytes
|
|
MD5:
f850354ffd241471d59271f95c977a51
SHA1:
1f19f7d3e3464c509506cd0acd24b63e26d086be
SHA256:
6053C74D0DFDFAA678D5162E5B756E75F72A519FE0D5709CC2175C3839698D2F
File Size:
5.95 MB, 5950617 bytes
|
Show More
|
MD5:
9465bd99fe47ce6b1d54b1aeb7f75bdf
SHA1:
7ae4e8ba6a76d3b59ac0819130b66865bccbc0e7
SHA256:
A45BF46EC512AD2E52ED4E77842BF5351B53E5670CF2F311022148071CAADA92
File Size:
6.84 MB, 6837824 bytes
|
|
MD5:
9406991027661844a872d4caa36c4656
SHA1:
5e4bfa0ae2bedd70f6d3a417eaad55ea5254658a
SHA256:
56C37054D0ECE2B290244182F569B108169CA7C56BAA6807F8D27EC5DE3E810A
File Size:
8.41 MB, 8409600 bytes
|
|
MD5:
6603adf1281c091cbc2a32e51b2c1ddd
SHA1:
e98b1289af03fbf0a95f72b3ccfebe8e3aacad36
SHA256:
9935969220C861623C6B6D8DF2BF08ABA73863F2BA4CC0995AE29D248D7F0B50
File Size:
7.64 MB, 7638016 bytes
|
|
MD5:
6e0926861fc966016faaeb74e1a16a5d
SHA1:
7b5898e8a10b406c5f883331843017906009460d
SHA256:
DC74316F673AE30E2131A7253C6C7C0D5069E39FC9C0099031B7B9EF29CB507F
File Size:
7.64 MB, 7638064 bytes
|
|
MD5:
6bbf188a102ea67241c55426947832a7
SHA1:
befe0b37dabce9e7b06889af5cab81b9368c0f74
SHA256:
5E8170A3EDC0F06DA9EC6215A4595A072DD99C268342920BEE263398A73EC243
File Size:
2.58 MB, 2584576 bytes
|
|
MD5:
054d17927ff01b37330934246a3f1f5e
SHA1:
f271d66ed7ccfb7bd0e7f3f3c918b611288ae3d9
SHA256:
9D3A97DF30D09B450BEEBF69C37A6F271C7A4A916857950B2D9CE03C3DC62AFE
File Size:
7.64 MB, 7638064 bytes
|
|
MD5:
e1dc250fa8c14e6073ef038b3b983be1
SHA1:
0beae32a73b424fd4c1580938a2c010c26141483
SHA256:
ED421BF73FCA41F958B6938905AB50788E5C8AD85B18CD9B7A64A11A0F0A2227
File Size:
7.64 MB, 7638064 bytes
|
|
MD5:
da470bb4467cc487cc0131bead628b76
SHA1:
49fb6744b95f93c984a2bf2224f4d02c90306769
SHA256:
B0EFF3EAC5177A10AB441498665E822A1A7FD8CD51F276BE645BCC450E3097E7
File Size:
4.69 MB, 4689920 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File has exports table
- File has TLS information
- File is 32-bit executable
- File is 64-bit executable
- File is either console or GUI application
Show More
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Comments | Wicked |
| Company Name |
|
| File Description |
|
| File Version |
|
| Internal Name |
|
| Legal Copyright |
|
| Original Filename |
|
| Product Name |
|
| Product Version |
|
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| Adobe Inc. | DigiCert EV Code Signing CA (SHA2) | Hash Mismatch |
File Traits
- CryptUnprotectData
- dll
- GetConsoleWindow
- Installer Version
- No Version Info
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 4,495 |
|---|---|
| Potentially Malicious Blocks: | 0 |
| Whitelisted Blocks: | 4,495 |
| Unknown Blocks: | 0 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Agent.ENA
- Agent.FDGD
- Tedy.L
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| c:\ibinstaller_98220.exe | Generic Write,Read Attributes |
| c:\program files\windows nt\accessories\install\set-up.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\program files\windows nt\accessories\install\set-up.exe | Generic Write,Read Attributes |
| c:\program files\windows nt\accessories\install\white.gif | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\program files\windows nt\accessories\install\white.gif | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\aut4354.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\aut45a7.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\creativecloud\acc\adobedownload\hdinstaller.log | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\set-up.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\set-up.exe | Synchronize,Write Attributes |
Show More
| c:\users\user\appdata\local\temp\ixp000.tmp\set-up.exe_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\tmp4351$.tmp | Generic Write,Read Attributes,Delete |
| c:\users\user\appdata\local\temp\ixp000.tmp\uac.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\uac.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\uac.exe_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsx8e83.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsx8e83.tmp\execcmd.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsx8e83.tmp\execcmd.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsx8e83.tmp\nsisdl.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsx8e83.tmp\nsisdl.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\~dfd250d51e5d6d9395.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKCU\software\microsoft\internet explorer\main\featurecontrol\feature_browser_emulation::b27fda4e652590dd110dc1c32abee4d8c084e9d3_0007638016.exe | ⫹ | RegNtPreCreateKey |
| HKCU\software\microsoft\internet explorer\main\featurecontrol\feature_browser_emulation::7b5898e8a10b406c5f883331843017906009460d_0007638064 | ⫹ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows\currentversion\runonce::wextract_cleanup0 | rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Mdbwkchn\AppData\Local\Temp\IXP000.TMP\" | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 未ﳝ쁽ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | *1\??\C:\Windows\SystemTemp\MicrosoftEdgeUpdate.exe.old5af52 *1\??\C:\Windows\SystemTemp\CopilotUpdate.exe.old5af62 *1\??\C:\P | RegNtPreCreateKey |
| HKCU\software\microsoft\internet explorer\main\featurecontrol\feature_browser_emulation::set-up.exe | ⫹ | RegNtPreCreateKey |
| HKCU\software\microsoft\internet explorer\main\featurecontrol\feature_browser_emulation::0beae32a73b424fd4c1580938a2c010c26141483_0007638064 | ⫹ | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Other Suspicious |
|
| Syscall Use |
Show More
|
| Anti Debug |
|
| User Data Access |
|
| Process Manipulation Evasion |
|
| Process Shell Execute |
|
| Network Winsock2 |
|
| Network Winsock |
|
| Process Terminate |
|
| Keyboard Access |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
C:\Users\Mdbwkchn\AppData\Local\Temp\IXP000.TMP\UAC.exe
|
"\IBInstaller_98220.exe"/VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs98220 -token mtn1co3fo4gs5vwq -subid 1878
|
C:\WINDOWS\system32\cmd.exe /C "\IBInstaller_98220.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs98220 -token mtn1co3fo4gs5vwq -subid 1878
|
WriteConsole: '\IBInstaller_98
|
C:\Users\Mdbwkchn\AppData\Local\Temp\IXP000.TMP\Set-up.exe
|
Show More
C:\Program Files\Windows NT\Accessories\install\Set-up.exe --silent --ADOBEINSTALLDIR=C:\InstallDir --INSTALLLANGUAGE=nl_NL
|