Threat Database Trojans Trojan.Downloader.Agent.BT

Trojan.Downloader.Agent.BT

By CagedTech in Trojans

Threat Scorecard

Threat Level: 80 % (High)
Infected Computers: 41
First Seen: June 22, 2021
Last Seen: December 12, 2025
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.Downloader.Agent.BT
Signature status: No Signature

Known Samples

MD5: 13c6a5651b6e57527595fe3fdf510ae9
SHA1: 0dc0f2e17ffb7377e28779986b1b9a382763b28c
SHA256: 525F95CE94A6E8088CFBF9FB7D046DF4A724076863CB644F2104090CBB046BBC
File Size: 1.33 MB, 1329152 bytes
MD5: 355971fe592ea16e50d85699cf1224ce
SHA1: 4a939fc4d0b2aa440e11917f8cc4836b073db0cc
SHA256: AA6D6856132B6B1CDFDDDF2C328571A482ACC402B655062A6C3A4A0218E71ECE
File Size: 3.58 MB, 3582464 bytes
MD5: e1c8c15bae953e5cc1e9e38d5c0768ac
SHA1: 70ce1149aac05e712faf5002b5d654a0dc5c7245
SHA256: 289A216B96676AA8D8AF449F8350867521997D2F8601C7E9ECA1F24E237917DE
File Size: 2.01 MB, 2005504 bytes
MD5: f7ea379231b6f6c8e6e3d6f300ecbe66
SHA1: 4ce5015a1a732d5487141ddccce75c6becf9f115
SHA256: 22D8168C08143D247EC014EBE4FC54F70D62872E9CDE98DA5038909B83964F94
File Size: 3.80 MB, 3798528 bytes
MD5: e86e45b2651d1f74f4927c8b64bdf28f
SHA1: 82a7263e47ca267c04b15cc1c9355b7334d81acf
SHA256: C084E9D92E156C0B9461FC36300B5C191112241E63AF608F16AA02C6BAF38B6E
File Size: 3.63 MB, 3634176 bytes
Show More
MD5: 74c26073de04f2b9d841350a23502d85
SHA1: dc8e3ec3d531633489303cbdc9d34aec2be37aea
SHA256: 779AB1BD954C8E3703EB01EC20F738A8BB9B55992DF932AFB4D8F198401981DC
File Size: 2.54 MB, 2537472 bytes
MD5: 9ccb807ef4854074772e5e9f9b0ee9dc
SHA1: 138b2e05a9980f9aa120be3eecb3f98029e61138
SHA256: 5FB02448837400C9660D19276D86DE85CCE4332556684BC0A6DBFA81B207D0D2
File Size: 3.08 MB, 3079680 bytes
MD5: ba6c1bea085c29d1b6fee2a10900029e
SHA1: a34cd916173435135b25bc9f09dea098b0e19fd7
SHA256: 2A6A0A297E2059F6A96958E16B3AAEE4FCA9FEC4074CFEB0E2ACC379CAB658BE
File Size: 3.31 MB, 3305472 bytes
MD5: c2dae4d58efa8526853fbdd1716f5d41
SHA1: 7e8f28cb99062b7400d2455badc3eb670317b88f
SHA256: 96AB926B71FB7E0E31C9E2F2A5B9897A1BE2BBFC9AAC08D84898F6A9284A6D4D
File Size: 2.42 MB, 2416640 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has exports table
  • File has TLS information
  • File is 64-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
Show More
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name Cherax
File Description Cherax Loader
File Version 1.0.0.1585
Internal Name Cherax.exe
Legal Copyright Copyright (C) 2019 - 2023
Original Filename Cherax.exe
Product Name Cherax Loader
Product Version 1.0.0.1585

File Traits

  • 2+ executable sections
  • Discord
  • GetConsoleWindow
  • HighEntropy
  • imgui
  • No Version Info
  • ntdll
  • VirtualQueryEx
  • WriteProcessMemory
  • x64

Block Information

Total Blocks: 3,523
Potentially Malicious Blocks: 313
Whitelisted Blocks: 3,071
Unknown Blocks: 139

Visual Map

0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 x x 0 x x 0 x x 0 0 0 x x 0 0 x 0 0 0 0 x x 0 x 0 0 0 0 x 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 x 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x 0 x 0 0 0 x x x x 0 x x 0 0 1 x 0 x 0 x 0 0 0 0 x 0 1 x 0 0 0 x x x 0 0 0 0 x x 0 0 0 0 x 0 x 0 x 0 0 0 x 0 0 0 0 0 0 x x 1 0 0 0 0 x x x 0 x x 0 0 x 0 x x 0 0 0 0 0 0 x 0 ? x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x 0 0 0 0 0 0 0 x 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x 0 0 x 0 x 0 x x x x 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 1 x x 0 x 0 x 0 0 0 1 x 0 0 1 0 0 0 x x 0 0 0 x x 0 0 0 1 0 0 x 0 0 0 0 x 0 0 x x x 0 0 0 0 0 0 x 0 0 0 0 0 x x x x 0 0 0 x 0 x 0 0 x x x 0 0 0 x x 0 0 0 0 x 0 0 0 0 x x 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 x 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 x 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 x 0 x 1 x x 0 0 x 0 0 0 0 0 0 x 0 0 0 0 0 0 x 0 ? 0 0 x x x 0 0 1 x 0 0 0 0 x 0 0 0 0 0 0 1 0 0 x 0 x 0 x 0 0 0 0 x 0 1 0 0 0 1 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 x 0 x x 0 0 0 0 0 0 0 0 x 0 1 0 x 0 0 0 0 0 0 x 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 x 0 0 1 0 0 1 0 x 0 0 0 1 0 0 1 0 0 1 0 0 1 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 x x 0 x 0 0 x 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 ? ? 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 x 0 x 0 0 0 x x 0 x ? x 0 0 0 x 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 x 0 x x 0 0 0 x x 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x x 0 0 x x ? 0 0 x 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 ? x ? ? ? x ? 0 0 ? 0 x 0 x x 0 0 0 0 0 x 0 0 0 0 x 0 0 0 0 0 x 0 x 0 0 0 x x 0 x x x 0 0 0 0 0 x 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x ? ? 0 0 ? ? ? 0 ? ? 0 ? 0 x 0 x ? x 0 0 x 0 x 0 0 x x 0 0 x x 0 ? ? ? 0 ? ? ? 0 0 0 0 x x 0 ? 0 0 ? 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 x 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 ? x x ? 0 0 ? 0 0 x x x x x x x 0 0 ? x ? ? 0 ? 0 0 x 0 0 x 0 0 x 0 x 0 1 0 x 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 x x x 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 ? ? ? ? ? ? ? 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 ? x x ? ? ? ? ? x x ? ? x x x x ? 0 ? ? ? ? ? ? ? 0 0 ? ? ? ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 x x 0 0 ? 0 ? ? x x ? ? ? 0 ? ? 0 ? ? ? ? ? 0 x ? ? ? ? 0 ? ? ? ? ? ? x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 0 0 0 0 0 ? ? x x x x 0 0 x x x x x x x x x 0 0 0 x 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 x x x x x x 0 0 0 0 x x x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x 0 0 x x 0 0 0 0 0 0 x x x 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 x x 0 0 x 0 0 0 0 x 0 x 0 0 0 0 x x 0 0 0 0 0 x x x 0 0 x x x 0 x x x 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Agent.GBG
  • Agent.WG
  • Downloader.Agent.BTF
  • Gamehack.AEEB
  • Injector.KFSC
Show More
  • Kryptik.FSJ
  • Kryptik.KBBI
  • Trojan.Agent.Gen.RD

Files Modified

File Attributes
\device\namedpipe\menuinjectiondata Generic Write

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAccessCheck
  • ntdll.dll!NtAddAtomEx
  • ntdll.dll!NtAlertThreadByThreadId
  • ntdll.dll!NtAllocateLocallyUniqueId
  • ntdll.dll!NtAllocateReserveObject
  • ntdll.dll!NtAlpcConnectPort
  • ntdll.dll!NtAlpcConnectPortEx
  • ntdll.dll!NtAlpcCreatePort
  • ntdll.dll!NtAlpcCreateSecurityContext
  • ntdll.dll!NtAlpcDeleteSecurityContext
Show More
  • ntdll.dll!NtAlpcQueryInformation
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtAssociateWaitCompletionPacket
  • ntdll.dll!NtClearEvent
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateEvent
  • ntdll.dll!NtCreateIoCompletion
  • ntdll.dll!NtCreateMutant
  • ntdll.dll!NtCreateNamedPipeFile
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtCreateSemaphore
  • ntdll.dll!NtCreateThreadEx
  • ntdll.dll!NtCreateTimer
  • ntdll.dll!NtCreateTimer2
  • ntdll.dll!NtCreateWaitCompletionPacket
  • ntdll.dll!NtCreateWorkerFactory
  • ntdll.dll!NtDeviceIoControlFile
  • ntdll.dll!NtDuplicateObject
  • ntdll.dll!NtDuplicateToken
  • ntdll.dll!NtEnumerateKey
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenEvent
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenMutant
  • ntdll.dll!NtOpenProcess
  • ntdll.dll!NtOpenProcessTokenEx
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenSemaphore
  • ntdll.dll!NtOpenThreadToken
  • ntdll.dll!NtOpenThreadTokenEx
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryFullAttributesFile
  • ntdll.dll!NtQueryInformationFile
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryLicenseValue
  • ntdll.dll!NtQueryObject
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQuerySecurityObject
  • ntdll.dll!NtQuerySystemInformation
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryWnfStateData
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtReadRequestData
  • ntdll.dll!NtReadVirtualMemory
  • ntdll.dll!NtReleaseMutant
  • ntdll.dll!NtReleaseSemaphore
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtRemoveIoCompletionEx
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationThread
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtSetIoCompletionEx
  • ntdll.dll!NtSetTimer2
  • ntdll.dll!NtSubscribeWnfStateChange
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForAlertByThreadId
  • ntdll.dll!NtWaitForMultipleObjects
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWorkerFactoryWorkerReady
  • ntdll.dll!NtWriteFile
  • ntdll.dll!NtYieldExecution
  • UNKNOWN

Related Posts

Trending

Most Viewed

Loading...