Threat Database Trojans Trojan.Agent.XCO

Trojan.Agent.XCO

By CagedTech in Trojans

Analysis Report

General information

Family Name: Trojan.Agent.XCO
Signature status: No Signature

Known Samples

MD5: 60a58bd8872f42e286f6dad3e477df75
SHA1: f3ae22352a33deb4777b6364a494b3a3ddad3245
SHA256: 85A2E4E1B991B76BAB46AC3104F45304CDCF64B4C13E35531E3B46C34D623ABE
File Size: 61.44 KB, 61440 bytes
MD5: 52f0b9fa8f9c2a36604b8d6890706a97
SHA1: b654bdf89096af6e0f7b8b5c87bbd53a209c8bf6
SHA256: 8F27B0B2BDDA41985207FD40634367AE14AFA5ADF46A53FAB8E2AFB39EAF57B3
File Size: 61.44 KB, 61440 bytes
MD5: 9b072fbace1ffe5d6a5fc55099174bec
SHA1: 1ee82ab133517c70afe3615b16f42423b6cb0869
SHA256: 0AE09D1D329B7C3621DDB4D4273B8B2E008E89ED8C4043C83C0AD9D92EA29D84
File Size: 74.84 KB, 74841 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name OSSSR.COM
File Description
  • MouseAim Loader
  • SecureCRT 绿化工具
File Version
  • 2, 0, 0, 0
  • 1.0.0.0
Internal Name Loader
Legal Copyright
  • Copyright (C) 2000-2007 SoftBoys, Inc.
  • Copyright 2025
Legal Trademarks SoftBoys, Inc.
Original Filename Loader.exe
Product Name
  • MouseAim
  • SecureCRT Green
Product Version
  • 2, 0, 0, 0
  • 1.0.0.0

File Traits

  • 7-zip (In Overlay)
  • 7-zip SFX
  • Installer Manifest
  • nosig nsis
  • Nullsoft Installer
  • WriteProcessMemory
  • x86

Block Information

Total Blocks: 83
Potentially Malicious Blocks: 53
Whitelisted Blocks: 30
Unknown Blocks: 0

Visual Map

x x 0 x 0 x x 0 x x 0 0 x x x x 0 x 0 0 0 0 x 0 0 0 x x x x 0 0 x x x x x 0 x x x x x 0 0 x 0 x 0 x 0 x 0 x 0 x 0 x 0 x 0 x x x x x x x 0 x 0 0 x x x x 0 x x x x x x
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Agent.XCO
  • Danabot.RA
  • Danabot.RB

Files Modified

File Attributes
c:\users\user\appdata\local\temp\nsib3d6.tmp Synchronize,Write Attributes

Windows API Usage

Category API
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation

Trending

Most Viewed

Loading...