Threat Database Trojans Trojan.MSIL.Agent.FFP

Trojan.MSIL.Agent.FFP

By CagedTech in Trojans

Analysis Report

General information

Family Name: Trojan.MSIL.Agent.FFP
Signature status: Hash Mismatch

Known Samples

MD5: bdfd663fc71dad52f40c85689800d093
SHA1: f264eae8b0891802439d31367fe033ec14508f42
SHA256: 7EECA5EA825E864E3F38EB149DF13FB168C93D72728FE5837C209F75DDA136C4
File Size: 1.12 MB, 1122600 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File is .NET application
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Assembly Version 9.0.225.6610
Comments .NET Host
Company Name Microsoft Corporation
File Description .NET Host
File Version 9.0.225.6610
Internal Name dotnet.exe
Legal Copyright © Microsoft Corporation. All rights reserved.
Original Filename dotnet.exe
Product Name .NET
Product Version 9.0.225.6610

Digital Signatures

Signer Root Status
.NET Microsoft Code Signing PCA 2011 Hash Mismatch

File Traits

  • .NET
  • HighEntropy
  • x86

Block Information

Total Blocks: 39
Potentially Malicious Blocks: 6
Whitelisted Blocks: 23
Unknown Blocks: 10

Visual Map

? x ? ? x 0 ? 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 x 0 0 0 x 0 0 0 x 0 ? ? ? 0 0 ? x ?
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • MSIL.Agent.FFP

Files Modified

File Attributes
c:\users\user\appdata\roaming\dotnet.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\dotnet.vbs Generic Write,Read Attributes

Windows API Usage

Category API
User Data Access
  • GetComputerNameEx
  • GetUserDefaultLocaleName
  • GetUserObjectInformation
Encryption Used
  • BCryptOpenAlgorithmProvider
  • CryptAcquireContext
Anti Debug
  • NtQuerySystemInformation
Other Suspicious
  • AdjustTokenPrivileges
Process Terminate
  • TerminateProcess

Trending

Most Viewed

Loading...