Threat Database Trojans Trojan.Agent.XSKA

Trojan.Agent.XSKA

By CagedTech in Trojans

Analysis Report

General information

Family Name: Trojan.Agent.XSKA
Signature status: Hash Mismatch

Known Samples

MD5: 3e207e2a1ec37c4fb72840334f09310e
SHA1: 20d7400fcb35046a32aa790e80d081dd0ab2b264
SHA256: 5988B14E59D3920A8B8124DF7F59EEE94CE7BA6120605FE04E81EF593C2359DB
File Size: 5.62 MB, 5619784 bytes
MD5: 5a916ebd868642889f99e654c10892ad
SHA1: db97860b9c680d3519837fcfd8f4172a8cfdb1fd
SHA256: AFECEFA6D9BD1E6D1C92144209EDA320E1FE0F196FFA8E8BC114E7D3A25503F6
File Size: 4.22 MB, 4217720 bytes
MD5: 2ea651d8d32d5cad23994830c7cc79fc
SHA1: 46862e8f61c971be3201764a36e8421c3135be89
SHA256: EA3DFAC25C73482091159AAD711AF456B6D0A2234F182833526357730EB3C94E
File Size: 4.22 MB, 4217720 bytes
MD5: f11f132548f5e2c5c14200686dca91e5
SHA1: ba03d28479ac64d7adfbd106ee853a2f54b36a4f
SHA256: CC7182F137D1078086C388CFFA5282DF222D5A6A777179F74C0D59042295247E
File Size: 4.97 MB, 4967804 bytes
MD5: 9c12ff43e67508377ea03916b217fdfb
SHA1: f3f25621f98f0878ffbcd91c15e4f0268950a70f
SHA256: 21B27F53183F8613C33B50490E001E75678AD73944588987623CFDDD67733CB0
File Size: 6.63 MB, 6626144 bytes
Show More
MD5: 004abb9cfc0db1dedfd6353326eb7cce
SHA1: e2df20997efe783dd2e903242ebe6ed3abad3627
SHA256: FC40DDB1D23ACCC40164165EB0C7CD194D2B356EFE180283B754FA57007FE405
File Size: 4.22 MB, 4217720 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has exports table
  • File has TLS information
  • File is 32-bit executable
  • File is 64-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
Show More
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments
  • Sciter contains libPNG (www.libpng.org), ZLib (www.zlib.org), libJPEG (www.ijg.org), AGG (www.antigrain.com) and DyBase ( www.garret.ru ) special credits to their authors.
  • This installation was built with Inno Setup.
Company Name
  • Microsoft Corporation
  • Terra Informatica Software, Inc.
File Description
  • Collagenase Setup
  • Cosmogony Setup
  • MFCDLL Shared Library - Retail Version
  • sciter-x.dll - embeddable Sciter engine
File Version
  • 11.0.60610.1 built by: Q11REL
  • 7.6.0.0
  • 6.8.0.0
Internal Name
  • MFC110U.DLL
  • sciter-x
Legal Copyright
  • Copyright © 2002-2010, Terra Informatica Software, Inc., http://terrainformatica.com
  • © Microsoft Corporation. All rights reserved.
Original Filename
  • MFC110U.DLL
  • sciterx.dll
Product Name
  • Collagenase
  • Cosmogony
  • Microsoft® Visual Studio® 2012
  • Sciter, Terra Informatica Software
Product Version
  • 11.0.60610.1
  • 11.0.54.0
  • 8.6
  • 1.4

Digital Signatures

Signer Root Status
ESET, spol. s r.o. DigiCert Trusted Root G4 Hash Mismatch
ESET, spol. s r.o. ESET Root Certificate Authority 2020 Hash Mismatch
Microsoft Corporation Microsoft Code Signing PCA Hash Mismatch
Microsoft Corporation Microsoft Code Signing PCA 2011 Hash Mismatch

File Traits

  • dll
  • HighEntropy
  • x64

Block Information

Total Blocks: 10,451
Potentially Malicious Blocks: 7,116
Whitelisted Blocks: 3,321
Unknown Blocks: 14

Visual Map

0 0 ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 ? x 0 ? ? ? ? ? 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 x 0 0 x 0 0 x 0 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 0 x x 1 x x 0 x x x x x x x x x 1 x x x x x x 0 0 x x x x x 0 x x x x x x x x x x x x ? ? ? ? x x x x x 0 0 0 x 0 0 0 0 0 0 0 x x x 0 0 0 0 0 x x 0 x 0 0 x x x x 0 0 x x x x 0 0 x x x x x x x 0 x x x x x x x x 0 0 x x x x x x x x x x x 0 x x x x x x x x 0 0 0 0 x x x x x x x 0 x 0 x x 0 x x x 0 x x x x x x x 0 0 x x 0 0 x x x x x x x x x x x x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 0 0 0 0 0 0 0 0 0 x 0 x x x x x x x x 0 x x x x x x x x x x x 0 x x x x x x x 0 x 0 0 x x x 0 0 x 0 x x x x x x x 0 0 x x 0 x 0 0 x x x x x x x 0 x x x 0 x x x 0 0 0 0 x x x x x x x x x x x 0 x x 0 x x x 0 0 x x x 0 x x x x x x x x x x x 0 0 0 x x x x x x x x x x x x x x 0 x x x x 0 x x x x x x x x 0 x x x x x x 0 x x x x x x x x x x x x x x x 0 x x x x x x x x x x x x x 0 0 0 x 0 x x 0 0 0 0 x x x x x 0 0 x 0 x x x x x x x 0 0 x x x x x x x 0 0 x x x x 0 x x x x x x x x x x x x x x x 0 x x x x x x x x x x x x x x x x x 0 x x 0 x x x x x x 0 x x x x x x x x 1 0 x x x x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x x x x x x x x x 0 0 x x x x x x 0 0 x x x x x 0 0 x x x x x 0 x x x x x 0 x x x 0 0 x x x x x x x x 0 x x x x x x x x x x x x x x 0 0 0 0 x x 0 x x x 0 x 0 x 0 x x x x x x 0 x x 0 x x x x x x x x x x 0 x x x x x x x x x x x x x x 0 x x x x x x x x 0 x x 0 x x x 0 x 0 0 0 x 0 0 x x 0 0 0 0 x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x 0 x 0 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x 0 x x x x x x x x x x x x x x x x x x 0 x x x x x x 0 x x x x x x x x x x x x 0 x x x x x x x 0 x x x 0 x x x 0 x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x 0 x x 0 x x x 0 x x x x x x x x x x 0 x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 0 x x x x 0 x x x 0 0 x 0 x x x x x x x x x x x 0 0 x 0 x x x x x x 0 x x 0 x 0 x x x 0 0 0 x 0 0 0 x x x x x x x 0 x 0 0 1 x 0 x x x x x x x x x x 0 0 x 0 0 x x x x x 0 x 0 x x x 0 x 0 0 x x x x x 0 x 0 x x x 0 0 0 0 x x 0 x x 0 x x x 0 0 0 0 0 x x 0 x x x 0 x x x x 0 x x x x 0 0 0 x 0 x x x x x x x x 0 0 0 0 x x x x x x x x 0 0 x 1 0 x x x x x x x x x 0 x 0 x 0 x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x 0 x x x 0 x 0 x 0 0 x x x x x 0 x x x x x x x x x x x x 0 x 0 0 x 0 0 x x x x x 0 0 x x x 0 0 x x 0 x x x x x 0 x x x x x x x 0 0 x x 0 x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 0 x x x 0 0 x 0 0 x x x x x x x x x x x 0 0 x x x x x x 0 x x x x x x x x 0 x x x x x x x 0 x x 0 x 0 x 0 x x x x x x x x 0 x x 0 x x x x x x x x x x x x x x x x x x 0 x x x x x x x 0 x x x x x 0 x 0 x x x x x x 0 x x x x x 0 x x x x 0 0 x x x x x x x x x 0 x 0 x x x x x 0 x 0 x x 0 x 0 x x x x x x x x x x x x x 0 x x x x x x x x 0 0 0 0 0 0 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x 0 x x 0 x x x 0 x 0 x x x x 0 x x x x x x 0 0 x x x x x x x x x x x x x x x 0 x x x x x x x x x 0 x x 0 0 x 0 x x x x x x x x 0 x x 0 x x x x 0 x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 0 x x 0 x 0 x x x x x x x x x 0 x x 0 x 0 0 x 0 x 0 x x 0 x 0 0 x 0 0 0 x x x 0 0 x x x x x x x x 0 0 0 x x x 0 x x 0 x 0 x 0 x x x 0 x 0 0 0 x x x x x x x x x 0 0 x 0 0 x 0 0 0 x x x x x x x x x x 0 x x 0 x 0 x 1 x x 0 x x x 0 0 x x x x x 0 x x 0 0 0 x x x 0 x x x x x x 0 0 x x x x x x x x x x x 0 x x x x x x 0 0 0 x x x 0 0 0 x 0 x x x x x x x x x 0 x x 0 x x 0 0 0 0 0 x 0 0 x x x x x x 0 0 x x x 0 x x x x x x x 0 x x x x x x 0 0 0 x 0 0 x x x x x x x x x x x x x x 0 0 x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x x 0 x 0 0 0 0 0 0 x x x x x x x x x x x x x x x x x 0 0 0 x x x x x 0 0 0 x x x 0 0 x x x 0 x 0 x x x x x x 0 x x x x 0 x x 0 x x x x x x x x 0 x 0 1 x x 0 x x x x x x x x x x x 0 0 x x x x x x 0 0 x x x 0 x x x x 0 0 x x x x x x 0 x x x x x 0 0 x x x x x x x 0 0 x 0 x x x 0 x 0 x x x x x x x x x x x x x x x x x x 0 x x x x 0 0 x x x x x x x x x x x
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Agent.XSKA
  • Rugmi.GH

Files Modified

File Attributes
c:\users\user\appdata\local\temp\is-aogfq.tmp\ba03d28479ac64d7adfbd106ee853a2f54b36a4f_0004967804.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-grmlm.tmp\_isetup\_setup64.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-grmlm.tmp\chaibclees.bii Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-grmlm.tmp\fusionlink.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-grmlm.tmp\hiel.sgnu Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-grmlm.tmp\msvcp140.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-grmlm.tmp\protobuflite.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-grmlm.tmp\sciter-x.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-grmlm.tmp\vcruntime140.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-grmlm.tmp\vcruntime140_1.dll Generic Write,Read Attributes
Show More
c:\users\user\appdata\local\temp\is-o3qin.tmp\f3f25621f98f0878ffbcd91c15e4f0268950a70f_0006626144.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-sad5o.tmp\_isetup\_setup64.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-sad5o.tmp\chaibclees.bii Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-sad5o.tmp\fusionlink.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-sad5o.tmp\hiel.sgnu Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-sad5o.tmp\msvcp140.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-sad5o.tmp\protobuflite.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-sad5o.tmp\sciter-x.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-sad5o.tmp\vcruntime140.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-sad5o.tmp\vcruntime140_1.dll Generic Write,Read Attributes

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAlertThreadByThreadId
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenSection
Show More
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySystemInformation
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForAlertByThreadId
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWorkerFactoryWorkerReady
  • ntdll.dll!NtWriteFile
  • ntdll.dll!NtWriteVirtualMemory
  • UNKNOWN
  • win32u.dll!NtUserGetKeyboardLayout
  • win32u.dll!NtUserGetThreadState
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess

Shell Command Execution

"C:\Users\Ltqrmljv\AppData\Local\Temp\is-AOGFQ.tmp\ba03d28479ac64d7adfbd106ee853a2f54b36a4f_0004967804.tmp" /SL5="$D0086,4580029,121344,c:\users\user\downloads\ba03d28479ac64d7adfbd106ee853a2f54b36a4f_0004967804"
"C:\Users\Ltqrmljv\AppData\Local\Temp\is-GRMLM.tmp\FusionLink.exe"
"C:\Users\Hiajcsrh\AppData\Local\Temp\is-O3QIN.tmp\f3f25621f98f0878ffbcd91c15e4f0268950a70f_0006626144.tmp" /SL5="$7018A,6240388,121344,c:\users\user\downloads\f3f25621f98f0878ffbcd91c15e4f0268950a70f_0006626144"
"C:\Users\Hiajcsrh\AppData\Local\Temp\is-SAD5O.tmp\FusionLink.exe"

Trending

Most Viewed

Loading...