Trojan.Downloader.Agent.BTPB
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.Downloader.Agent.BTPB |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
77a9e90fcc39d21c3d37cde508b1d3eb
SHA1:
5a1b974f9aa511ce3ed808907e3a3efe28e1ba72
File Size:
1.23 MB, 1232896 bytes
|
|
MD5:
b777ae7947e2e8d9639bed9f36da5f68
SHA1:
c0e506c5c1db0db5568a1f2b8455b961d730b3bb
File Size:
1.36 MB, 1361408 bytes
|
|
MD5:
2872efef581456fa670574627941f978
SHA1:
dc6799a55a6ccfdf6737f9ce435f5d1f2aa9c5d5
File Size:
1.40 MB, 1399296 bytes
|
|
MD5:
b8fde0248724e1f0d02d8708ce51933f
SHA1:
b86fa248dd16dbe4bd86e51e73612995c20462ea
File Size:
1.14 MB, 1135104 bytes
|
|
MD5:
3b2c8a18507ccc0f9b711769336b588a
SHA1:
b76ac644259587a025c01e89319fa8b116855d9d
SHA256:
8E3143AA1492E6D539E2EFADD53B994E9E07F622A0BEBD47630E7CC06DD43EB9
File Size:
1.08 MB, 1079808 bytes
|
Show More
|
MD5:
062af43745f99d3b224f97ad6c0b3862
SHA1:
203b2faa74060271c641265c47b24f5193ea497b
SHA256:
F1A7AA42C71D236B3569A829B66904C17B2D738D474E35312277187DAC5C74B0
File Size:
1.41 MB, 1405440 bytes
|
|
MD5:
519954e6d01d2b10583fc8b0d66c657e
SHA1:
a7afcf8f3ff0be4f90c5614ca3bf655738cb34de
SHA256:
73CBED903DE7A36A0C6A8FF0CAE991686006E47C2D8D8A8DC087AB6B773940C0
File Size:
1.22 MB, 1221632 bytes
|
|
MD5:
7970fb3ee52bec47738705b42c606499
SHA1:
281a190714ab873f3bf7600312fc37b464063621
SHA256:
80FF03A5E579435E99E7761B7C5F2F73C5469873C3D5588649677942692F8039
File Size:
1.35 MB, 1351680 bytes
|
|
MD5:
cfdf25e95b5e1231d76833d804282506
SHA1:
17729f188475a516bf3232d2702939d5b8846dff
SHA256:
64F34D3C8D723DF9DFA69865DFF5EB8958E20AE8C078632F3F82FF2A063035E7
File Size:
1.03 MB, 1031680 bytes
|
|
MD5:
829b809f45de974cd71f8a03076aadc6
SHA1:
f3f9a15776496b7c7668aa89126f2328309af726
SHA256:
5A2A7DF3FBC6811BD73B16ECF5C6213BFA6AD9E6FD7E174E74791390C5652F8C
File Size:
1.36 MB, 1361920 bytes
|
|
MD5:
eeaa165fba0b1813f20e84e8a2b2b9d9
SHA1:
e0ebb27932ad29b10cccd753d367e4acbede572b
SHA256:
EE38813FB3A6FE33E94B15933FC46BE3B7E0828683657AFE2654BF5E8EBEF372
File Size:
1.37 MB, 1368064 bytes
|
|
MD5:
761a200c196bc0b81c4483ed981abdb5
SHA1:
c28c2828486e7f3fc5dc3bad8fd4646a07bef665
SHA256:
CEE6A5114518AE843908E00D52B602F9A2F5F0A4284C6372541DA3F7079E4D11
File Size:
1.19 MB, 1191424 bytes
|
|
MD5:
c5511c5f56c0531b6b8d71d28a3c1e94
SHA1:
7c12f2e81d4f984b6eae7e44d62616917efd3dbf
SHA256:
99685D65F747F5B592027114AF7E9A7736E7653E70ED942896961DFB7684CC85
File Size:
1.70 MB, 1703424 bytes
|
|
MD5:
9535bbe9ecfa81050eadd7cbc946d576
SHA1:
9c67e36dc9dedea1fca306fab30d6d2c2cb02c5b
SHA256:
7BBE309B4CB070D6C3C4F090A5B1D817B90616C5C3994137B3BB3AE77B124C28
File Size:
1.20 MB, 1199616 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have exports table
- File doesn't have resources
- File doesn't have security information
- File is 64-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Traits
- No Version Info
- x64
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 610 |
|---|---|
| Potentially Malicious Blocks: | 91 |
| Whitelisted Blocks: | 496 |
| Unknown Blocks: | 23 |
Visual Map
0
0
0
0
0
0
0
0
0
x
x
0
0
0
0
x
0
?
?
?
x
x
0
x
x
x
?
0
0
x
x
x
?
0
?
?
?
?
?
0
?
0
?
?
0
?
?
?
?
0
0
?
x
?
?
x
x
x
?
?
x
?
0
x
0
x
0
x
x
0
0
0
x
x
0
x
x
x
0
x
x
x
x
x
0
x
x
0
x
0
x
x
0
x
x
x
x
x
x
x
x
0
0
0
0
0
0
0
0
0
0
0
0
0
x
x
x
0
0
0
x
x
0
x
0
0
0
0
x
x
0
0
0
0
0
x
0
0
x
x
x
0
x
x
x
x
x
x
0
x
x
x
0
0
x
x
x
x
x
0
x
x
x
0
x
x
x
x
x
x
x
x
x
0
x
x
x
x
0
0
0
x
0
x
0
x
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
0
1
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Agent.ZFBE
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | ޟ⻲Ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ᠙⽃Ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 곙҈Ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 䙮ӣǛ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 掿ⓛǛ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ុ┰Ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 㲀耺ൕǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ϧÈ൪ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 褁툒᤹ǜ | RegNtPreCreateKey |
Show More
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ﯗ퉥᤹ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 쳁ㆦ☖ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ⩍㈆☖ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 케셣♭ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ⲭ쇃♭ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | ߩ憴⚐ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ꂄ戎⚐ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 㓓⟙ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 㔰⟙ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 묥发㖒ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | ꎜⷧ阴ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 碞⸽阴ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 褣䶻쾪ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ແ七쾪ǜ | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
106 additional items are not displayed above. |
| Anti Debug |
|
| User Data Access |
|
| Network Winsock2 |
|
| Network Winsock |
|
| Process Shell Execute |
|
| Process Manipulation Evasion |
|
| Process Terminate |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
C:\WINDOWS\system32\cmd.exe C:\WINDOWS\system32\cmd.exe /c pause
|
WriteConsole: Press any key to
|
WriteConsole:
|