Trojan.Agent.TRG
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.Agent.TRG |
|---|---|
| Packers: | UPX! |
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
8012c365b540c68f42b43ed4dc08f3ac
SHA1:
db1ac691bb78a9cb8a5dfc1d74c0188d0bcebf36
SHA256:
98A10C773ACEEF4EA22526F176EAC7A1593B8F84ADC4972F65D56ECA1F014200
File Size:
4.85 MB, 4851712 bytes
|
|
MD5:
393a961e5735706f3a1171dd1b70400b
SHA1:
29f03b924f4a747328311b52c27712e76fba25df
SHA256:
B4793D8C33AF862862ADB516FC42D59E91C44F3C4289BCC39C7AD94B5B78787A
File Size:
3.52 MB, 3520000 bytes
|
|
MD5:
3a8d602efd8b5e67eaa4f7cabcb2a384
SHA1:
e268a2fea6b5f0f334b17ef96687ca3e229224b5
SHA256:
540B8704A6B6AF446D0969FEF5F8959881E0EC2EA57C8BF34F754A9B11A603C4
File Size:
3.50 MB, 3503616 bytes
|
|
MD5:
b5d9a61c4b44abe10e4bffe04b59dfaf
SHA1:
656842b9183eaed7f1d10f7fcd5fa093ed6ac15c
SHA256:
7764299681D941B444A48FAC1BA7BD737E25B2DD2A297EEBDD86FBA7B7B2ACBB
File Size:
3.69 MB, 3694080 bytes
|
|
MD5:
38bbaba639172971d249560ba87fbbe8
SHA1:
6c9dab3664b479f877852717c4362e913b55c9ad
SHA256:
71701AA5FD70A084F0E37565BD368E8856884AE9725B857C4D4A105A8A684D06
File Size:
2.35 MB, 2351104 bytes
|
Show More
|
MD5:
7e5fc5f9d8cd28a905a721d167025dc3
SHA1:
f00e0dff55397e80fa812267419314198f2739fe
SHA256:
80B3CA7A20ABF7A6E30F933B73683CE95F92FDF3BA065D2663200AC299005A73
File Size:
458.75 KB, 458752 bytes
|
|
MD5:
0baa751d51f399699dedeaf5b4054ee9
SHA1:
1467dc10721b032bd1c61212cd0af17f14a16d6e
SHA256:
E7A51618AD0AD0B7BF1B8F9F1D11CD04B793CB200BFB4065F3AD6B9F9ACFEB47
File Size:
5.75 MB, 5748224 bytes
|
|
MD5:
2f95da6d255ea171fe98231cfe30c420
SHA1:
5e83f0c21b44d64bd9d6459d660fa930b5374681
SHA256:
76331101E0DCB433F8C9552110C1E3337FDBF89221EC9030DD90FC72B5F1753F
File Size:
4.13 MB, 4129792 bytes
|
|
MD5:
3a7546642d1859fcb7d09ab511d6d40f
SHA1:
02084e3762f0186ec989cd386c69083a070609dd
SHA256:
AF5B28525A741F998FDA8DCA3977AC2A0C30CA3CC602E23DAB95A9038A2796A9
File Size:
2.90 MB, 2896384 bytes
|
|
MD5:
1efa3d0b4f3a9c3e38de2161fee96b44
SHA1:
f297a718c1c316e0f1177c8d6f5a6aa81257906f
SHA256:
BB64BA65820B0F74847DF423708491C55B5D06C0480346E3534801B4248C7083
File Size:
397.82 KB, 397824 bytes
|
|
MD5:
bbbae739b14591c1d8ac7c979c35d857
SHA1:
69f4cbbe06291024327a066d780548c9a4623548
SHA256:
C2C37DDED595B74D439E492DC094FDEE246FB84813A43A7AEFE278BDEF89404B
File Size:
3.27 MB, 3265024 bytes
|
|
MD5:
0d2f9b2f1908087772825b8c45f9ccfe
SHA1:
2ecc222f265f60cab072363e889038861c90a78c
SHA256:
898E8245C803EAB2CB7CC3AE91E2E8F95E402E111CF3668758631CDFEC159FFD
File Size:
1.45 MB, 1447424 bytes
|
|
MD5:
67a8d19272969dbb549f2795a79779e7
SHA1:
31ead11e19834298ce199be77ea6b96c44097882
SHA256:
EE10395E31417D47201DB9B388C5C18E5D25D9F317ED24290CEA97F81E253458
File Size:
1.44 MB, 1435648 bytes
|
|
MD5:
b667531b1be99c69720a911bc9028c37
SHA1:
7a8be01120197755b69e5735901cab5772566ee7
SHA256:
0CE01710FD952FA491F4184E0D6DA3086F26CE96C16CE543EB106CBC77A8A891
File Size:
1.44 MB, 1435136 bytes
|
|
MD5:
1bc8b8ab11070a4c521ccc2153c3d6a5
SHA1:
9fa87326926030c6a231f555e956fc96eb81536c
SHA256:
B775892B4F9F070C82D7970B999A04958FBB84BF502D829D6FC825E88C2AF2AF
File Size:
3.30 MB, 3301376 bytes
|
|
MD5:
6d0037c69cea8d28104e7efcd0344f2d
SHA1:
70fb7d19a4411411d24a288b85851689533a4f68
SHA256:
24CF7B3FE87C25DD132BAFA15EF20B3CD4DA7B85EE6B7818CAF05454CB0D8792
File Size:
721.92 KB, 721920 bytes
|
|
MD5:
7c7f9c8053a51fe611c76b61cf7056e9
SHA1:
084066aad6b791c5391d93f7f4a8f36ca5819f8b
SHA256:
2FFD25D8CCCA327212B3DF628FA758FEFC40E9D2DCF1E7BFC9A49FC83EBCB5BC
File Size:
2.87 MB, 2865152 bytes
|
|
MD5:
7414ef122559cb61558f2dda347945e7
SHA1:
974d6709295886f9ed98010803427d72b0dc7e2b
SHA256:
F775006DF33C06E9DFD5CAC1FE1353EBC909385A266E0BE49747F365960CF014
File Size:
1.02 MB, 1022976 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have security information
- File has been packed
- File has TLS information
- File is 64-bit executable
- File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
Show More
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Traits
- 2+ executable sections
- dll
- fptable
- GetConsoleWindow
- HighEntropy
- imgui
- No Version Info
- ntdll
- packed
- VirtualQueryEx
Show More
- WriteProcessMemory
- x64
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 2,703 |
|---|---|
| Potentially Malicious Blocks: | 307 |
| Whitelisted Blocks: | 2,396 |
| Unknown Blocks: | 0 |
Visual Map
x
x
0
0
0
0
x
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
x
x
0
x
x
0
x
x
0
0
0
x
x
0
0
x
0
0
0
0
x
x
0
x
0
0
0
0
x
0
0
0
x
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
x
0
x
0
0
0
0
0
x
0
0
x
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
x
x
x
x
0
x
x
0
0
1
x
0
x
0
x
0
0
0
0
x
0
1
x
0
0
0
x
x
x
0
0
0
0
x
x
0
0
0
0
x
0
x
0
x
0
0
0
x
0
0
0
0
0
0
x
x
1
0
0
0
0
x
x
x
0
x
x
0
0
x
0
x
x
0
0
0
0
0
0
x
0
x
x
0
0
0
0
0
0
0
0
0
0
x
x
0
0
0
0
0
0
0
x
x
0
0
0
x
x
0
0
0
0
0
0
0
0
0
0
0
x
x
x
0
0
0
x
0
x
0
0
x
x
x
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
1
x
x
0
x
0
0
x
0
0
0
1
x
0
0
1
0
0
x
x
0
0
0
x
0
x
0
0
0
0
0
0
x
x
x
0
0
0
0
0
0
x
0
0
0
0
0
x
x
x
x
0
0
0
x
0
x
0
0
x
x
x
0
0
0
x
x
0
x
0
0
x
0
0
0
0
x
x
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
x
0
x
0
0
0
0
0
x
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
x
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
x
0
x
1
x
x
x
0
0
x
0
0
0
0
0
0
0
x
0
0
0
0
0
0
x
0
x
0
0
x
x
x
0
0
1
x
0
0
0
0
x
0
0
0
0
0
0
1
0
0
x
0
x
0
x
0
0
0
x
x
0
1
0
0
0
1
0
0
0
0
x
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
x
0
0
x
0
0
0
0
0
0
0
0
x
0
0
0
x
0
0
0
0
0
x
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
1
x
0
0
1
0
0
1
x
0
0
0
0
1
0
0
1
0
0
1
0
0
1
0
0
1
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
x
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
x
0
0
x
0
0
0
0
0
0
0
0
0
0
0
x
x
0
x
0
0
x
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
x
0
0
x
0
x
x
x
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
x
0
x
0
0
0
x
x
0
x
x
x
x
x
0
x
x
x
x
0
0
0
x
0
0
0
0
0
0
0
0
x
0
x
0
0
0
0
0
0
0
0
0
x
0
x
x
0
0
0
x
x
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
x
0
0
0
0
0
0
x
0
0
x
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
x
x
x
x
0
0
0
0
0
x
0
x
x
0
0
x
x
x
0
x
0
0
0
0
0
0
0
x
x
x
0
0
0
0
0
0
0
0
0
0
0
x
x
0
0
x
x
0
0
0
0
x
0
x
x
x
x
x
0
x
x
x
0
0
0
0
0
0
x
0
0
0
x
x
x
x
0
0
x
x
x
0
0
0
0
0
x
0
0
0
x
x
0
0
0
x
x
x
0
x
x
x
0
0
0
0
x
0
0
0
0
0
x
x
0
0
0
0
0
0
0
x
x
x
x
x
0
x
0
x
0
x
x
x
x
0
x
0
x
0
x
x
x
x
0
x
0
x
0
x
x
x
x
0
x
0
x
0
0
x
x
0
x
0
0
0
x
0
0
x
x
0
x
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
x
0
x
x
0
0
x
x
x
0
0
x
x
x
x
x
x
x
0
x
x
x
x
x
x
x
x
0
x
x
x
x
x
x
x
0
x
x
x
x
x
x
0
0
x
x
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
1
2
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
...
Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Agent.TRG
- ClipBanker.TI
- Coinminer.GU
- Gamehack.GAIG
- Gamehack.GDDG
Show More
- Gamehack.GDDH
- Gamehack.GSH
- Gamehack.GYF
- Gamehack.JAC
- Injector.KFSC
- Kryptik.EFJ
- SpyLoader.D
- TelegramHack.A
- TelegramHack.B
- TelegramHack.C
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe | Generic Read,Write Attributes |
| \device\namedpipe | Generic Write,Read Attributes |
| c:\windows\system32\reboot.log | Generic Write,Read Attributes |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | ₎ꃮ赑ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 둰幜闩ǜ | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
8 additional items are not displayed above. |
| Keyboard Access |
|
| Anti Debug |
|
| Process Terminate |
|
| User Data Access |
|