Threat Database Trojans Trojan.Agent.LKFB

Trojan.Agent.LKFB

By CagedTech in Trojans

Analysis Report

General information

Family Name: Trojan.Agent.LKFB
Signature status: No Signature

Known Samples

MD5: e26fb158b5eb0f35c501ba7804955dec
SHA1: 0b7c00a3c97a61f1dc434c70afda09f9f3b24e03
SHA256: 79A7C0EAADDDFC715089BE7E01DFFC9E28386C0F478209D630423A8AFE88D358
File Size: 7.16 MB, 7158272 bytes
MD5: e1dce60f54c43daa4ba3d862bd70e470
SHA1: 63b710afd02a200e0e8eb924f38065ae3e1fb75d
SHA256: FEC9F7021F48631BABC04435ACE14B07E8FCED0FDE3304786BB4F06E15000176
File Size: 7.15 MB, 7152128 bytes
MD5: a5e62f94df69ff21b98873733013a50a
SHA1: e9f801afa21f22302d40c6f7499e421225b1f3b2
SHA256: 1E9C806676B8D6EBE02DC0833BAB86F97D9BC750762EB1A531F1C94A844AF472
File Size: 6.62 MB, 6618112 bytes
MD5: df11ee1863e89f89c5d0c89de8b8cac3
SHA1: 516f9d45a5095d05cde7906b8e653d9afe402607
SHA256: 96870D6E416470F053B91777E22F1D859AD19EEE0FD2DF816DF3ECEBE9560CF7
File Size: 7.14 MB, 7142400 bytes
MD5: 00615f1a46899c659ad9582f43489f9f
SHA1: bec3e4bd5ce7de11dca42697f31d094c0f54ded5
SHA256: 2BE97A48015544620FE1E3BB69B130A24DDBB31F9719173868579DF489E9356C
File Size: 6.62 MB, 6620160 bytes
Show More
MD5: 0ee1d17ea5d7c72754d9f772aa326e8d
SHA1: 212a186812c337a768c153bb08f8410baed7e9ce
SHA256: D42FD17628467ED0ACBCFEE539562AE9CF45EA37F30E3EE07D7A41A8C8999512
File Size: 7.14 MB, 7144448 bytes
MD5: 48cfa1d016f73b400f5b1d29a1573257
SHA1: 0476fb4433cd745cba46347ebd045dcba50a54ff
SHA256: 68ED1EF9CE120358139C7B4621CC757D42C30B603DFAB630B13D46720032301B
File Size: 7.15 MB, 7152128 bytes
MD5: 886cdc0303280c5fb46c63f8c495ed1c
SHA1: 236ac98c9a3358eae2d247c93c16cc716c847c78
SHA256: 4D2FEE5493691FEB9E68F0A29AF1DF7624DA62F1B5229051A29A347021231752
File Size: 7.14 MB, 7142400 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have security information
  • File has exports table
  • File has TLS information
  • File is 64-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Traits

  • dll
  • fptable
  • HighEntropy
  • No Version Info
  • x64

Block Information

Total Blocks: 3,134
Potentially Malicious Blocks: 279
Whitelisted Blocks: 2,431
Unknown Blocks: 424

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 ? ? ? 0 0 ? 0 ? 0 0 ? ? ? ? 0 0 ? 0 0 0 0 0 0 0 0 1 ? x ? 0 ? 0 0 0 ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 ? ? ? ? 0 ? ? x ? 0 0 0 0 0 ? 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? ? 0 0 0 0 0 0 1 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 ? ? ? 0 0 0 0 0 0 x 0 0 0 0 0 x ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 ? 0 ? 0 0 0 0 0 ? ? ? ? 0 0 0 0 ? ? ? 0 0 0 0 0 0 ? 1 ? 0 ? ? 0 ? ? ? 0 0 0 0 0 0 0 0 ? ? ? 0 0 0 0 0 0 0 ? 0 ? ? ? 0 ? ? ? ? ? ? ? ? ? ? 0 x 0 x ? 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 1 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 ? ? ? 0 ? 0 0 ? ? ? 0 0 0 0 x 0 0 ? 0 0 2 0 0 0 0 0 0 0 x 0 0 0 1 0 0 0 0 ? 1 0 1 2 0 0 ? ? ? ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? 0 ? 0 0 0 0 0 0 0 0 ? ? ? x 0 0 0 0 ? ? 0 0 0 ? ? ? 0 0 ? x ? ? ? ? 0 0 0 0 0 0 0 0 0 1 ? 0 0 0 0 0 ? 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 0 0 ? 0 ? ? x 0 0 ? 0 ? 1 0 0 ? ? ? ? x ? ? ? 0 0 0 ? 0 ? ? ? 0 0 0 0 0 x ? ? 0 0 ? 0 ? 0 ? ? ? 0 ? ? ? ? ? 0 ? ? 0 0 0 ? 0 0 0 0 0 ? 0 0 ? 0 ? 0 0 ? ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 ? 0 ? 0 0 x 0 0 0 0 ? 1 x ? ? ? x 0 x x x 0 x x 0 0 ? ? 0 ? x 1 ? ? ? 0 ? 0 ? 1 x ? x 0 0 0 0 0 0 0 0 x 0 0 0 0 ? ? 0 0 ? x 0 x x 1 ? 0 0 0 0 0 x 0 0 x 1 x 0 0 0 ? ? ? 0 0 0 0 0 0 0 ? ? 0 x 0 x 0 x x 0 0 x 0 ? ? ? ? ? ? ? 0 0 ? 0 0 0 0 0 0 0 ? 0 ? x ? ? 0 0 x 0 ? 0 0 x 0 0 0 1 0 ? ? x 0 ? 0 0 0 0 0 0 0 0 1 x 0 0 0 x x ? 0 0 0 ? x x ? 0 0 0 ? 0 0 0 0 0 0 0 ? 1 ? ? x 0 x ? 0 ? ? 0 0 0 x 0 0 ? 0 0 ? 0 0 0 0 0 0 0 x x 0 x 0 ? 0 0 ? ? 0 1 ? 0 0 0 0 0 0 0 x 0 ? ? ? 0 x x x x x 0 0 0 0 0 x ? ? 0 x 0 0 x ? 0 0 0 ? 0 0 0 0 0 0 0 ? ? 0 ? ? 0 0 x x ? 0 0 x x 0 ? 0 0 0 0 ? 0 0 0 ? 0 0 0 0 0 0 0 0 0 1 0 ? 0 0 0 0 0 0 0 0 x x 0 0 0 x 0 ? x x 0 0 x 0 0 0 0 x x 0 0 ? 0 0 0 x x x x 1 ? ? 0 ? 0 1 0 x ? 0 0 0 ? 0 0 0 ? ? x ? ? ? 0 0 x 0 x ? x 0 ? ? x ? ? 0 0 x x x 0 0 0 x ? x ? ? 0 ? 0 ? ? 0 0 ? 0 ? x x 0 0 0 0 0 0 x ? x 0 0 1 0 0 0 ? ? 0 0 0 0 0 ? ? 0 1 ? 0 0 ? 0 0 0 0 0 0 0 0 x x x 0 ? 0 x 0 x ? ? ? 0 0 x 0 0 0 0 0 0 ? 0 0 0 0 x 0 ? x 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 x x ? 0 0 0 x ? x 0 ? ? ? x 0 ? 0 x x ? ? x ? ? ? 0 ? ? ? x x 0 x 0 x ? ? 0 ? x 0 0 x ? 0 0 0 0 ? ? x 0 x 0 0 0 0 0 0 ? 0 0 0 0 ? 0 ? 0 0 ? 0 ? ? 0 x 0 ? x ? 0 0 x ? 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 ? 0 1 0 0 ? 0 x 0 ? ? ? ? ? ? ? ? 0 ? ? ? 0 ? ? 0 0 0 0 ? ? ? ? ? 0 0 0 1 0 0 x x ? x x 0 ? 0 ? x 0 0 0 0 ? ? 0 0 0 0 0 0 0 ? ? 1 0 0 ? ? ? 0 0 0 ? 0 0 ? 0 0 0 0 0 ? 0 0 0 0 ? x 0 1 0 ? 0 0 ? x ? 0 0 0 0 0 0 ? 0 ? 0 ? 0 0 0 ? 0 0 0 0 x ? 0 ? 0 ? 0 0 0 ? 0 0 0 0 1 0 ? 0 ? x 0 0 ? x ? 1 ? ? ? 0 0 0 0 0 0 ? 0 0 x x x 0 0 0 0 0 0 0 0 0 0 0 x ? ? x 0 0 0 ? 0 ? 0 0 1 0 0 0 0 0 0 0 x 0 ? 0 0 0 0 0 0 0 0 0 ? x 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 ? 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 ? ? ? ? x 0 ? 0 ? x ? ? 0 0 ? 0 0 0 0 0 x 0 0 0 0 0 0 0 0 x ? ? ? ? ? ? ? 0 ? ? 0 ? ? ? ? ? ? x ? ? ? 0 0 ? 0 ? ? ? ? ? ? ? 0 0 ? ? ? 0 0 ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? 0 ? ? ? ? 0 ? ? ? ? ? ? 0 0 0 0 0 x 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 x 0 0 0 0 0 0 0 0 x x 0 x 0 0 0 0 x x 0 x 0 0 0 0 0 0 0 0 0 x x x 0 0 0 0 x x 0 0 0 0 0 0 0 x 0 x 0 x x x 0 x x x 0 x x 0 x 0 0 x 0 0 0 0 0 0 0 0 0 0 0 x 0 0 x 0 0 x 0 0 0 0 0 0 0 x x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 x 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 x x x x x 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 x 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 x 0 0 0
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Agent.CLAC
  • Agent.KFS
  • Agent.LKFB
  • Coinminer.LFB
  • Marte.CO

Files Modified

File Attributes
c:\windows\system32\svctrl64.exe Generic Write,Read Attributes
c:\windows\system32\u775659.dll Generic Write,Read Attributes
c:\windows\system32\wsvcz\wlogz.dat Generic Write,Read Attributes

Registry Modifications

Key::Value Data API Name
HKLM\system\controlset001\control\session manager\power::hiberbootenabled RegNtPreCreateKey
HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe ᫿尵䢬ǜ RegNtPreCreateKey
HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe ᫿尵䢬ǜ RegNtPreCreateKey
HKLM\system\controlset001\services\u775659\parameters::servicedll C:\Windows\System32\u775659.dll RegNtPreCreateKey
HKLM\software\microsoft\windows nt\currentversion\svchost::dcomlaunch PowerLSMBrokerInfrastructurePlugPlayDcomLaunchSystemEventsBrokerDeviceInstallu775659 RegNtPreCreateKey

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAccessCheck
  • ntdll.dll!NtAlertThreadByThreadId
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtClearEvent
  • ntdll.dll!NtClose
  • ntdll.dll!NtConnectPort
  • ntdll.dll!NtCreateEvent
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateKey
Show More
  • ntdll.dll!NtCreateMutant
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtCreateSemaphore
  • ntdll.dll!NtDeviceIoControlFile
  • ntdll.dll!NtDuplicateObject
  • ntdll.dll!NtDuplicateToken
  • ntdll.dll!NtEnumerateValueKey
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenProcessTokenEx
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenSemaphore
  • ntdll.dll!NtOpenThread
  • ntdll.dll!NtOpenThreadTokenEx
  • ntdll.dll!NtPowerInformation
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryDirectoryFileEx
  • ntdll.dll!NtQueryFullAttributesFile
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtQueryWnfStateData
  • ntdll.dll!NtReleaseMutant
  • ntdll.dll!NtReleaseSemaphore
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtRequestWaitReplyPort
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationThread
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtSetValueKey
  • ntdll.dll!NtSubscribeWnfStateChange
  • ntdll.dll!NtTerminateProcess
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtUnmapViewOfSectionEx
  • ntdll.dll!NtWaitForAlertByThreadId
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWorkerFactoryWorkerReady
  • ntdll.dll!NtWriteFile
  • ntdll.dll!NtYieldExecution
  • UNKNOWN
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
  • WriteConsole
Service Control
  • OpenSCManager
  • StartService
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation
Process Terminate
  • TerminateProcess

Shell Command Execution

"C:\Windows\System32\svctrl64.exe"
cmd.exe /c timeout /t 5 /nobreak && del /q "c:\users\user\downloads\0b7c00a3c97a61f1dc434c70afda09f9f3b24e03_0007158272"
WriteConsole: 'timeout' is not

Trending

Most Viewed

Loading...