Trojan.Agent.XSKA
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.Agent.XSKA |
|---|---|
| Signature status: | Hash Mismatch |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
3e207e2a1ec37c4fb72840334f09310e
SHA1:
20d7400fcb35046a32aa790e80d081dd0ab2b264
SHA256:
5988B14E59D3920A8B8124DF7F59EEE94CE7BA6120605FE04E81EF593C2359DB
File Size:
5.62 MB, 5619784 bytes
|
|
MD5:
5a916ebd868642889f99e654c10892ad
SHA1:
db97860b9c680d3519837fcfd8f4172a8cfdb1fd
SHA256:
AFECEFA6D9BD1E6D1C92144209EDA320E1FE0F196FFA8E8BC114E7D3A25503F6
File Size:
4.22 MB, 4217720 bytes
|
|
MD5:
2ea651d8d32d5cad23994830c7cc79fc
SHA1:
46862e8f61c971be3201764a36e8421c3135be89
SHA256:
EA3DFAC25C73482091159AAD711AF456B6D0A2234F182833526357730EB3C94E
File Size:
4.22 MB, 4217720 bytes
|
|
MD5:
f11f132548f5e2c5c14200686dca91e5
SHA1:
ba03d28479ac64d7adfbd106ee853a2f54b36a4f
SHA256:
CC7182F137D1078086C388CFFA5282DF222D5A6A777179F74C0D59042295247E
File Size:
4.97 MB, 4967804 bytes
|
|
MD5:
9c12ff43e67508377ea03916b217fdfb
SHA1:
f3f25621f98f0878ffbcd91c15e4f0268950a70f
SHA256:
21B27F53183F8613C33B50490E001E75678AD73944588987623CFDDD67733CB0
File Size:
6.63 MB, 6626144 bytes
|
Show More
|
MD5:
004abb9cfc0db1dedfd6353326eb7cce
SHA1:
e2df20997efe783dd2e903242ebe6ed3abad3627
SHA256:
FC40DDB1D23ACCC40164165EB0C7CD194D2B356EFE180283B754FA57007FE405
File Size:
4.22 MB, 4217720 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File has exports table
- File has TLS information
- File is 32-bit executable
- File is 64-bit executable
- File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
Show More
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Comments |
|
| Company Name |
|
| File Description |
|
| File Version |
|
| Internal Name |
|
| Legal Copyright |
|
| Original Filename |
|
| Product Name |
|
| Product Version |
|
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| ESET, spol. s r.o. | DigiCert Trusted Root G4 | Hash Mismatch |
| ESET, spol. s r.o. | ESET Root Certificate Authority 2020 | Hash Mismatch |
| Microsoft Corporation | Microsoft Code Signing PCA | Hash Mismatch |
| Microsoft Corporation | Microsoft Code Signing PCA 2011 | Hash Mismatch |
File Traits
- dll
- HighEntropy
- x64
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 10,451 |
|---|---|
| Potentially Malicious Blocks: | 7,116 |
| Whitelisted Blocks: | 3,321 |
| Unknown Blocks: | 14 |
Visual Map
0
0
?
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
0
?
x
0
?
?
?
?
?
0
0
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
x
0
0
x
0
0
x
0
0
x
0
0
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0
0
x
x
1
x
x
0
x
x
x
x
x
x
x
x
x
1
x
x
x
x
x
x
0
0
x
x
x
x
x
0
x
x
x
x
x
x
x
x
x
x
x
x
?
?
?
?
x
x
x
x
x
0
0
0
x
0
0
0
0
0
0
0
x
x
x
0
0
0
0
0
x
x
0
x
0
0
x
x
x
x
0
0
x
x
x
x
0
0
x
x
x
x
x
x
x
0
x
x
x
x
x
x
x
x
0
0
x
x
x
x
x
x
x
x
x
x
x
0
x
x
x
x
x
x
x
x
0
0
0
0
x
x
x
x
x
x
x
0
x
0
x
x
0
x
x
x
0
x
x
x
x
x
x
x
0
0
x
x
0
0
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0
0
0
0
0
0
0
0
0
0
x
0
x
x
x
x
x
x
x
x
0
x
x
x
x
x
x
x
x
x
x
x
0
x
x
x
x
x
x
x
0
x
0
0
x
x
x
0
0
x
0
x
x
x
x
x
x
x
0
0
x
x
0
x
0
0
x
x
x
x
x
x
x
0
x
x
x
0
x
x
x
0
0
0
0
x
x
x
x
x
x
x
x
x
x
x
0
x
x
0
x
x
x
0
0
x
x
x
0
x
x
x
x
x
x
x
x
x
x
x
0
0
0
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0
x
x
x
x
0
x
x
x
x
x
x
x
x
0
x
x
x
x
x
x
0
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0
x
x
x
x
x
x
x
x
x
x
x
x
x
0
0
0
x
0
x
x
0
0
0
0
x
x
x
x
x
0
0
x
0
x
x
x
x
x
x
x
0
0
x
x
x
x
x
x
x
0
0
x
x
x
x
0
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0
x
x
0
x
x
x
x
x
x
0
x
x
x
x
x
x
x
x
1
0
x
x
x
x
x
x
x
x
x
0
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0
0
x
x
x
x
x
x
0
0
x
x
x
x
x
0
0
x
x
x
x
x
0
x
x
x
x
x
0
x
x
x
0
0
x
x
x
x
x
x
x
x
0
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0
0
0
0
x
x
0
x
x
x
0
x
0
x
0
x
x
x
x
x
x
0
x
x
0
x
x
x
x
x
x
x
x
x
x
0
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0
x
x
x
x
x
x
x
x
0
x
x
0
x
x
x
0
x
0
0
0
x
0
0
x
x
0
0
0
0
x
x
x
x
x
x
0
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0
x
0
0
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0
x
x
0
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0
x
x
x
x
x
x
0
x
x
x
x
x
x
x
x
x
x
x
x
0
x
x
x
x
x
x
x
0
x
x
x
0
x
x
x
0
x
x
x
0
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0
x
x
0
x
x
0
x
x
x
0
x
x
x
x
x
x
x
x
x
x
0
x
0
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0
0
x
x
x
x
0
x
x
x
0
0
x
0
x
x
x
x
x
x
x
x
x
x
x
0
0
x
0
x
x
x
x
x
x
0
x
x
0
x
0
x
x
x
0
0
0
x
0
0
0
x
x
x
x
x
x
x
0
x
0
0
1
x
0
x
x
x
x
x
x
x
x
x
x
0
0
x
0
0
x
x
x
x
x
0
x
0
x
x
x
0
x
0
0
x
x
x
x
x
0
x
0
x
x
x
0
0
0
0
x
x
0
x
x
0
x
x
x
0
0
0
0
0
x
x
0
x
x
x
0
x
x
x
x
0
x
x
x
x
0
0
0
x
0
x
x
x
x
x
x
x
x
0
0
0
0
x
x
x
x
x
x
x
x
0
0
x
1
0
x
x
x
x
x
x
x
x
x
0
x
0
x
0
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0
x
x
x
x
x
x
x
x
0
x
x
x
0
x
0
x
0
0
x
x
x
x
x
0
x
x
x
x
x
x
x
x
x
x
x
x
0
x
0
0
x
0
0
x
x
x
x
x
0
0
x
x
x
0
0
x
x
0
x
x
x
x
x
0
x
x
x
x
x
x
x
0
0
x
x
0
x
0
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0
0
x
x
x
0
0
x
0
0
x
x
x
x
x
x
x
x
x
x
x
0
0
x
x
x
x
x
x
0
x
x
x
x
x
x
x
x
0
x
x
x
x
x
x
x
0
x
x
0
x
0
x
0
x
x
x
x
x
x
x
x
0
x
x
0
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0
x
x
x
x
x
x
x
0
x
x
x
x
x
0
x
0
x
x
x
x
x
x
0
x
x
x
x
x
0
x
x
x
x
0
0
x
x
x
x
x
x
x
x
x
0
x
0
x
x
x
x
x
0
x
0
x
x
0
x
0
x
x
x
x
x
x
x
x
x
x
x
x
x
0
x
x
x
x
x
x
x
x
0
0
0
0
0
0
0
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0
x
x
0
x
x
0
x
x
x
0
x
0
x
x
x
x
0
x
x
x
x
x
x
0
0
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0
x
x
x
x
x
x
x
x
x
0
x
x
0
0
x
0
x
x
x
x
x
x
x
x
0
x
x
0
x
x
x
x
0
x
0
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0
0
x
x
0
x
0
x
x
x
x
x
x
x
x
x
0
x
x
0
x
0
0
x
0
x
0
x
x
0
x
0
0
x
0
0
0
x
x
x
0
0
x
x
x
x
x
x
x
x
0
0
0
x
x
x
0
x
x
0
x
0
x
0
x
x
x
0
x
0
0
0
x
x
x
x
x
x
x
x
x
0
0
x
0
0
x
0
0
0
x
x
x
x
x
x
x
x
x
x
0
x
x
0
x
0
x
1
x
x
0
x
x
x
0
0
x
x
x
x
x
0
x
x
0
0
0
x
x
x
0
x
x
x
x
x
x
0
0
x
x
x
x
x
x
x
x
x
x
x
0
x
x
x
x
x
x
0
0
0
x
x
x
0
0
0
x
0
x
x
x
x
x
x
x
x
x
0
x
x
0
x
x
0
0
0
0
0
x
0
0
x
x
x
x
x
x
0
0
x
x
x
0
x
x
x
x
x
x
x
0
x
x
x
x
x
x
0
0
0
x
0
0
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0
0
x
x
0
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0
x
x
x
x
x
x
x
x
x
0
x
0
0
0
0
0
0
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0
0
0
x
x
x
x
x
0
0
0
x
x
x
0
0
x
x
x
0
x
0
x
x
x
x
x
x
0
x
x
x
x
0
x
x
0
x
x
x
x
x
x
x
x
0
x
0
1
x
x
0
x
x
x
x
x
x
x
x
x
x
x
0
0
x
x
x
x
x
x
0
0
x
x
x
0
x
x
x
x
0
0
x
x
x
x
x
x
0
x
x
x
x
x
0
0
x
x
x
x
x
x
x
0
0
x
0
x
x
x
0
x
0
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0
x
x
x
x
0
0
x
x
x
x
x
x
x
x
x
x
x
...
Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Agent.XSKA
- Rugmi.GH
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| c:\users\user\appdata\local\temp\is-aogfq.tmp\ba03d28479ac64d7adfbd106ee853a2f54b36a4f_0004967804.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-grmlm.tmp\_isetup\_setup64.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\is-grmlm.tmp\chaibclees.bii | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-grmlm.tmp\fusionlink.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-grmlm.tmp\hiel.sgnu | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-grmlm.tmp\msvcp140.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-grmlm.tmp\protobuflite.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-grmlm.tmp\sciter-x.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-grmlm.tmp\vcruntime140.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-grmlm.tmp\vcruntime140_1.dll | Generic Write,Read Attributes |
Show More
| c:\users\user\appdata\local\temp\is-o3qin.tmp\f3f25621f98f0878ffbcd91c15e4f0268950a70f_0006626144.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-sad5o.tmp\_isetup\_setup64.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\is-sad5o.tmp\chaibclees.bii | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-sad5o.tmp\fusionlink.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-sad5o.tmp\hiel.sgnu | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-sad5o.tmp\msvcp140.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-sad5o.tmp\protobuflite.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-sad5o.tmp\sciter-x.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-sad5o.tmp\vcruntime140.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-sad5o.tmp\vcruntime140_1.dll | Generic Write,Read Attributes |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
|
| Process Manipulation Evasion |
|
| Process Shell Execute |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
"C:\Users\Ltqrmljv\AppData\Local\Temp\is-AOGFQ.tmp\ba03d28479ac64d7adfbd106ee853a2f54b36a4f_0004967804.tmp" /SL5="$D0086,4580029,121344,c:\users\user\downloads\ba03d28479ac64d7adfbd106ee853a2f54b36a4f_0004967804"
|
"C:\Users\Ltqrmljv\AppData\Local\Temp\is-GRMLM.tmp\FusionLink.exe"
|
"C:\Users\Hiajcsrh\AppData\Local\Temp\is-O3QIN.tmp\f3f25621f98f0878ffbcd91c15e4f0268950a70f_0006626144.tmp" /SL5="$7018A,6240388,121344,c:\users\user\downloads\f3f25621f98f0878ffbcd91c15e4f0268950a70f_0006626144"
|
"C:\Users\Hiajcsrh\AppData\Local\Temp\is-SAD5O.tmp\FusionLink.exe"
|