Trojan.Agent.KTH
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.Agent.KTH |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
6a4398c075126c5d15527eea41b470a1
SHA1:
dcf923efef13ad865d07ed898e3de2a2fe576270
SHA256:
A7D262425CE2F35134652FE02B72A15F4BC52C32D9B4860C722A81078F27CF0F
File Size:
171.52 KB, 171520 bytes
|
|
MD5:
db94d90e8f0b502b267cd96d2aa55256
SHA1:
53ad7c6988681a9654820f50ed49dd0525848d5b
SHA256:
583900EA2DC3F7DF8375CF74C74CC034615F5359683C8E6804036609C8C57E6B
File Size:
260.10 KB, 260096 bytes
|
|
MD5:
1cb6861bb58ec622c5721b2bd129fc9f
SHA1:
490f4983b9fd98f4f3417e3db590a52863ad8bf5
SHA256:
76490C593A2FD01DB77C2C7DC8D5EC6399CA05F64B460401EC6258190A90C06D
File Size:
162.30 KB, 162304 bytes
|
|
MD5:
d66673f0de0bc865b9375258e2f854b0
SHA1:
d911fb8082dd7b6e6c4aa40862f2274e520d852c
SHA256:
9C79B93C1BEB4AE483F9C7D8EED01D8972AA9BDC5A207DD3950540228640613F
File Size:
167.42 KB, 167424 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have exports table
- File doesn't have resources
- File doesn't have security information
- File is 64-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Traits
- fptable
- No Version Info
- x64
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 642 |
|---|---|
| Potentially Malicious Blocks: | 12 |
| Whitelisted Blocks: | 629 |
| Unknown Blocks: | 1 |
Visual Map
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
x
0
0
x
x
x
0
x
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
x
x
x
0
x
x
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
2
0
0
0
0
0
0
0
1
0
1
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Agent.JOC
- Agent.KTH
- Agent.LOFD
- Agent.POSF
- Agent.UFRA
Show More
- Agent.XSKA
- Injector.KFSC
- MSIL.FakeMS.QT
- PSWDump.C
- Trojan.Kryptik.Gen.EIZ
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| c:\users\user\appdata\local\microsoft\windows\powershell\startupprofiledata-noninteractive | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_cenecszi.nv0.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_ct3i3f3y.xbk.ps1 | Generic Write,Read Attributes |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 斐䙅䐟ǜ | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
|
| Network Urlomon |
|
| Process Shell Execute |
|
| Anti Debug |
|
| User Data Access |
|
| Encryption Used |
|
| Other Suspicious |
|
| Process Terminate |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
"C:\Users\Zlpjxqex\AppData\Local\xho\nbgtpasrg.exe"
|
powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -File "C:\Users\Zlpjxqex\AppData\Local\xho\dadaasads_new.ps1"
|
WriteConsole: The argument 'C:
|
WriteConsole:
|
WriteConsole: Windows PowerShe
|
Show More
WriteConsole:
|
WriteConsole:
|
"C:\Users\Hdiedlhq\AppData\Local\etqoz\nbgtpasrg.exe"
|
"C:\Users\Ruagrxkp\AppData\Local\pmgo\nbgtpasrg.exe"
|
"C:\Users\Ruagrxkp\AppData\Local\pmgo\sece.exe"
|
"C:\Users\Xhiexcvp\AppData\Local\avxjf\qrmpd.exe"
|
"C:\Users\Xhiexcvp\AppData\Local\avxjf\jzdqlpos.exe"
|