Threat Database Trojans Trojan.Agent.GFDB

Trojan.Agent.GFDB

By CagedTech in Trojans

Analysis Report

General information

Family Name: Trojan.Agent.GFDB
Signature status: No Signature

Known Samples

MD5: e75a1b1fbb1d0c30a288cf3bf4a31d12
SHA1: 10e3c58b33f84f3eac96234566f22017d4f42c82
SHA256: 42188DECD8F21D9EE301C28454EFA60E99E9ED4164773289B85CE6AAB23F8492
File Size: 5.15 MB, 5152944 bytes
MD5: 23faa642e7002b1386c17f5dbfac302a
SHA1: e62b0906477bda10240c7ec794e2ba5673976a0b
SHA256: CA6B30F62C10B18D77EFB578F8D4A5D71BBC616039406006A492EF600882C94B
File Size: 5.14 MB, 5138008 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments This installation was built with Inno Setup.
Company Name Scooter Software
File Version 3.0.7.9037
Legal Copyright Copyright © 2008 Scooter Software, Inc.
Product Name Beyond Compare 3
Product Version 3.0.7.9037

Digital Signatures

Signer Root Status
Scooter Software Inc Scooter Software Inc Hash Mismatch

File Traits

  • No Version Info
  • x86

Files Modified

File Attributes
\device\namedpipe\gmdasllogger Generic Write,Read Attributes
c:\users\user\appdata\local\microsoft\windows\explorer\iconcache_16.db Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\microsoft\windows\explorer\iconcache_idx.db Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-aqn3u.tmp\10e3c58b33f84f3eac96234566f22017d4f42c82_0005152944.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-n5d2m.tmp\is-dfat5.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-u1lsg.tmp\_shfoldr.dll Generic Read,Write Data,Write Attributes,Write extended,Append data

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation

Shell Command Execution

"C:\Users\Ysyuokjt\AppData\Local\Temp\is-AQN3U.tmp\10e3c58b33f84f3eac96234566f22017d4f42c82_0005152944.tmp" /SL5="$6004A,4714779,341504,c:\users\user\downloads\10e3c58b33f84f3eac96234566f22017d4f42c82_0005152944"
C:\Users\Kinewexi\AppData\Local\Temp\is-N5D2M.tmp\is-DFAT5.tmp /SL4 $5038C c:\users\user\downloads\e62b0906477bda10240c7ec794e2ba5673976a0b_0005138008 5094859 68096

Trending

Most Viewed

Loading...