Threat Database Trojans Trojan.Agent.LPB

Trojan.Agent.LPB

By CagedTech in Trojans

Analysis Report

General information

Family Name: Trojan.Agent.LPB
Signature status: No Signature

Known Samples

MD5: 19237381070b2a7369ef9c3c787bb5c3
SHA1: fdfcd3bf9731995831a2cd460bf15f1de4c54e6c
SHA256: C96A09096B843A074834726C12BB3D240B04FD9240AC881D8BB16733B3B0A07C
File Size: 72.19 KB, 72192 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is 32-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Traits

  • 2+ executable sections
  • HighEntropy
  • No Version Info
  • x86

Block Information

Total Blocks: 124
Potentially Malicious Blocks: 5
Whitelisted Blocks: 119
Unknown Blocks: 0

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 x
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Betload.A

Files Modified

File Attributes
\device\namedpipe Generic Read,Write Attributes
\device\namedpipe Generic Write,Read Attributes
c:\a478.tmp\sfastboot.bat Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\log.txt Generic Write,Read Attributes
c:\users\user\appdata\local\temp\qkyjxj.exe Generic Read,Write Data,Write Attributes,Write extended,Append data

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Network Winsock2
  • WSAStartup
Network Winsock
  • freeaddrinfo
  • getaddrinfo
Network Icmp
  • IcmpCreateFile
  • IcmpSendEcho2Ex

Shell Command Execution

"\A478.tmp\sfastboot.bat" "c:\users\user\downloads\fdfcd3bf9731995831a2cd460bf15f1de4c54e6c_0000072192"
C:\WINDOWS\system32\PING.EXE ping 127.0.0.1 -n 5
C:\WINDOWS\system32\PING.EXE ping -n 1 192.168.137.1
C:\WINDOWS\system32\find.exe find "TTL="

Trending

Most Viewed

Loading...