Threat Database Trojans Trojan.Agent.GHK

Trojan.Agent.GHK

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 26,333
Threat Level: 80 % (High)
Infected Computers: 18
First Seen: October 9, 2024
Last Seen: November 20, 2025
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.Agent.GHK
Signature status: No Signature

Known Samples

MD5: 84062dc8a145451db438a95cf187add5
SHA1: 59bc0cb8596e94da7a1c044d8760cc11c7f10e54
SHA256: B64BC9CD15973E07A639E1A2B516B1F008AB058FD5B8D301C888B95E386D293D
File Size: 1.71 MB, 1705472 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have security information
  • File has exports table
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Company Name Microsoft Corporation
File Description Windows Photo Viewer
File Version 10.0.19041.3636 (WinBuild.160101.0800)
Internal Name PhotoViewer
Legal Copyright © Microsoft Corporation. All rights reserved.
Original Filename PhotoViewer.dll
Product Name Microsoft® Windows® Operating System
Product Version 10.0.19041.3636

File Traits

  • dll
  • x86

Block Information

Total Blocks: 2,013
Potentially Malicious Blocks: 694
Whitelisted Blocks: 1,319
Unknown Blocks: 0

Visual Map

0 0 0 0 x 0 x 0 0 0 x 0 0 0 1 0 2 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 x 0 0 0 x 0 0 x 0 0 0 x 0 0 x 0 x 0 0 x 0 x 0 0 x 0 0 x 0 x 1 1 1 1 1 x 1 x 1 1 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 x 0 x x 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 2 0 0 0 0 0 0 0 0 0 x 0 x 0 0 x 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 x 0 0 0 x 0 0 0 x x x 0 0 0 0 0 x x x 0 0 0 0 x 0 x 0 0 x 0 x x 0 0 0 x 0 x x x x x 0 0 x x 0 0 0 0 0 0 0 x 0 x x x x x 0 0 x x x x x 0 0 x x x x 0 x x x x x 0 0 x x 0 x 0 x 0 x 1 x 0 0 x x x x x 0 0 0 0 0 0 x 0 0 x 0 0 0 0 0 x 0 x 0 0 0 0 0 0 x x x 0 0 x 0 0 0 x x 0 0 x 0 x x x x x x 0 0 x 0 0 0 x 0 0 x 0 0 0 x 0 0 0 x 0 0 0 x 0 1 x 1 x 1 1 1 1 x 0 0 0 0 x x x 0 x x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 x 1 1 x 0 0 0 0 x x 0 x 0 x x x x x 0 0 0 x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 2 2 0 0 x x 0 x x x x x x x 0 0 0 1 0 x 0 1 x x x x 0 0 x 1 x 0 x 0 1 0 0 x x x x 0 0 x x x 0 x x x x x x 0 0 0 x 0 0 0 0 x 0 0 x 1 0 x x 0 x x 0 0 x x x x x x 0 x x x x 0 x 0 0 1 0 0 0 0 x 0 x x x x x x x 0 0 0 0 0 0 x x 0 0 0 0 0 0 x x 0 0 0 x 0 0 0 0 0 0 0 0 0 x 0 0 x x x x x 0 0 0 x 0 x 0 x 0 0 x x x 0 0 x 0 x x x x 0 0 0 0 0 x x 0 0 0 0 x 0 x 0 0 1 1 0 0 0 0 0 0 0 0 0 x 0 0 x 0 x 0 x x 0 x x 0 0 0 x x 0 x 0 0 x x x 0 0 0 x 0 0 x 1 1 0 x 0 x x 0 0 0 0 x x x x 0 0 1 0 1 x x 0 0 0 0 0 0 0 0 0 x x x x 0 x 0 x x x x 0 0 0 0 0 x x 0 x 0 x x 0 0 0 x x 0 x 0 x x x x x x x x 0 0 0 0 x x x 0 0 0 0 0 x 0 0 0 0 0 0 0 0 1 0 0 0 0 0 x 0 x 0 1 0 x 0 x 0 0 x x 1 x x 0 0 x x 0 0 0 0 x x x 0 x 0 0 x x x x 0 x 0 0 x x 0 0 x x 0 0 0 x 0 x 0 x x 0 0 x 0 0 0 0 0 0 x 0 0 0 1 1 0 0 0 0 1 0 0 0 0 0 0 1 x 0 0 0 0 0 x x 1 0 0 0 0 0 0 0 x x 0 0 0 0 0 1 x 0 0 0 x 1 x 0 x x x 0 x x x 0 x 0 0 0 0 x x x 0 0 x x x x x 0 0 0 0 0 0 0 0 x 0 x 0 x x x 0 x 0 0 x x x x x x x x x 0 0 x x x 0 x x x x x x x x x x x x x 0 0 0 0 0 0 0 0 0 0 x x x x 0 0 0 0 0 0 x x x 0 x x 0 x 0 x 0 1 0 0 0 x 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 x x x x x 0 0 0 x x 0 0 x 0 0 x 0 x x 0 x x x x x x x x x x x 0 0 0 x x x 0 0 0 0 x x x x x x 0 x x x x 0 0 0 x 0 0 0 0 0 0 1 0 0 1 0 0 x 1 0 0 0 x 0 x 0 x x x x x x x x x x x x x x x 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x x x x x x 0 x x x 0 0 x x x x x 0 x 0 x 0 0 x 0 0 x 0 1 1 x 0 x 0 0 x 0 x x x x 0 0 0 x 0 0 x x 0 0 x 0 0 x 0 0 x 0 1 0 0 x x 0 x 0 x 0 0 x 0 0 x x 0 x x 0 x 0 x x x 0 0 0 0 1 1 x x 0 x 0 x x 0 x 0 0 x x x x 0 x x 0 x x x x x x 0 x x x x x x x x 0 x x x x 0 0 x x 0 0 x 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 x x 0 0 x 0 0 0 x x x x 0 0 0 0 0 x 0 0 0 x x 0 x 0 0 0 x x 0 0 0 x x x 0 x 0 0 0 0 0 0 0 x x x x x 0 0 x 0 x x 0 0 x 0 x x x 0 x x x x x 0 0 0 0 1 x x 0 0 x 0 0 0 0 x x 0 x x x 0 x x x x 0 0 0 x 0 x 0 0 x 0 0 x x 0 x x 1 0 0 0 0 0 x x x x x 0 0 0 0 x 0 x 0 x x 0 0 x 1 0 x x 0 x x 0 0 0 0 0 x x 0 x 0 0 x 0 x x x 0 0 x 1 x 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 x x 0 0 0 0 0 0 x 0 0 0 0 0 x 0 x x x x x x 0 0 x x 0 0 0 0 0 0 0 0 x 0 x 0 0 x x 0 0 0 0 1 0 x 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 x 0 0 x x x 0 0 0 0 0 x 0 0 0 x 0 0 x 0 x 0 0 0 0 x x 0 0 0 x 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 x x 0 0 0 0 0 x 0 x x 0 0 x 0 0 x 0 x 0 0 0 x 0 0 x 0 0 0 0 0 x 0 0 x x 0 x x 0 x x x x 0 x 0 0 0 0 0 0 x x x x x x 0 x 1 x x 0 x 0 0 0 0 x x x x 0 0 x x 0 0 0 0 0 0 x 0 0 0 0 0 x x x x x 0 0 x 0 0 0 0 0 x 1 x x x x x x 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 x 0 0 x 0 0 0 0 x 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 x x 0 0 x x 0 x x x x 0 x x 0 0 0 0 0 x 0 0 0 x x 0 0 1 0 x 0 0 0 x x x 0 0 x x x x x 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 1 0 0 0 0 0 1 0 0 2 2 0 0 2 0 0 1 0 0 0 0 0 3 1 1 1 1 1 0 0 0 1 1 2 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Agent.GHK

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtQueryAttributesFile
Show More
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWriteFile
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Anti Debug
  • NtQuerySystemInformation

Shell Command Execution

C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\59bc0cb8596e94da7a1c044d8760cc11c7f10e54_0001705472.,LiQMAxHB

Trending

Most Viewed

Loading...