Trojan.Agent.MAG
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 11,193 |
| Threat Level: | 80 % (High) |
| Infected Computers: | 138 |
| First Seen: | October 31, 2023 |
| Last Seen: | December 7, 2025 |
| OS(es) Affected: | Windows |
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.Agent.MAG |
|---|---|
| Signature status: | Hash Mismatch |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
393980ead62f79271f0eba3d86de78c0
SHA1:
a1cc0ec32dd5468b10c31cb961f7505ba97281ac
SHA256:
113987351417733277BEEF6A0FB2CF11CAA0CED9AA232069F888D987D28682DD
File Size:
7.87 MB, 7867984 bytes
|
|
MD5:
2f237c57266897ee8b41c9a005147f82
SHA1:
fb147ef989f15ed1b0299195240d4c944506002e
SHA256:
146D021FCF4E645B8286D76D88253A2EAEDE2D6E0B614505B5DDB37E4BD21F19
File Size:
6.00 MB, 6003464 bytes
|
|
MD5:
c3c512661edb0c05610b607f48fd58da
SHA1:
750c1e7c6e8e77923098e0d1e182298a0d850e1c
SHA256:
C0A4E96380C7218F30CEB21305403327E0507412937D85F8C6674ECBE67A4E26
File Size:
5.94 MB, 5940488 bytes
|
|
MD5:
d22c66cd590e8074fa8e70f407ff3daf
SHA1:
3a6a8e73e260be59e7abbc9af3ee63c29374b1bb
SHA256:
A9DCDF5260019C8A97E23F98501E8053C6687B303E75097B4C4A977A789DCA28
File Size:
5.93 MB, 5934856 bytes
|
|
MD5:
d5a5727d21e6575e0b71e15acb6609e0
SHA1:
7baaf31428eaa092d59de1c662ad4bead048dc95
SHA256:
0773FAF3B07302C82F681B112DF893C75F8EC382A6C7ACE7F64C3A15F02663DF
File Size:
7.81 MB, 7813680 bytes
|
Show More
|
MD5:
02b8dae224bfc4eeaaf47e992930d2e5
SHA1:
f2f76e8ba02d30ad7b698bc36d70b41e49604b10
SHA256:
B435EA91CE25F5F042EB9E3344ABB5E06935D4DFE78FF31966ADA817948094F2
File Size:
5.94 MB, 5935368 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have resources
- File has TLS information
- File is 64-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
Show More
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Company Name | Microsoft Corporation |
| File Description | WMI Provider Host |
| File Version | 10.0.26100.3323 (WinBuild.160101.0800) |
| Internal Name | Wmiprvse.exe |
| Legal Copyright | © Microsoft Corporation. All rights reserved. |
| Original Filename | Wmiprvse.exe |
| Product Name | Microsoft® Windows® Operating System |
| Product Version | 10.0.26100.3323 |
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| FIRMA DE CODIGO JAVA SECRETARIA GENERAL DE ADMINISTRACION DIGITAL | AC Componentes Informáticos | Hash Mismatch |
| Surfshark B.V. | GlobalSign Code Signing Root R45 | Hash Mismatch |
| Martin Tofall | Sectigo Public Code Signing Root R46 | Hash Mismatch |
File Traits
- 2+ executable sections
- HighEntropy
- No Version Info
- vmp section variant
- x64
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 1,805 |
|---|---|
| Potentially Malicious Blocks: | 182 |
| Whitelisted Blocks: | 417 |
| Unknown Blocks: | 1,206 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
|