Trojan.ShellcodeRunner.KA
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.ShellcodeRunner.KA |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
a1ae7c0a21c622027bd57ba8d3db81f3
SHA1:
b2e577b7c06b87f49732810dfc656a7e72360a05
SHA256:
7003086ED4424B2702F95A46413D82953555C63E260DCE2EE84DC5E33E474A7D
File Size:
125.44 KB, 125440 bytes
|
|
MD5:
e4dfa2003f9287daf9556f6f288b5a87
SHA1:
5ab09307c4327f42856d0a4410bfb4f220b2e2aa
SHA256:
B9D7F43A1E56489A01B31699E1A35523087F02E8CBDE1254FD5FC2C9E5408B6D
File Size:
141.31 KB, 141312 bytes
|
|
MD5:
0a1ee5757b010896df6249ed50b7eafa
SHA1:
6447ac6d13e311e3398ca83c7300ab2864c37b13
SHA256:
D52E927559BE610D178B21C7C8DE9010CE97F96A9BF93038F482C99A397745F0
File Size:
125.44 KB, 125440 bytes
|
|
MD5:
e37e8338eb3e694bcb8ef67aa3ce0c9d
SHA1:
6f7c0600c68bdd0bf2c8300cd7987e4cfb10e962
SHA256:
34303B577054CF8ECE4F6AB20523375AD9689A1B3A2F0857AE543AE57BBF16C9
File Size:
141.31 KB, 141312 bytes
|
|
MD5:
171bec65676818961178f2c7d8c521a2
SHA1:
cf0a3f8b5d13d2eeded6dacf952b8893509fa325
SHA256:
BC302CD5E3AB640EFD9C41A56412FED3A9BAC867AB21CC52389B0E88C8B348E5
File Size:
125.44 KB, 125440 bytes
|
Show More
|
MD5:
e9f2b53ed3a55cb2981ea825c8f79868
SHA1:
9ce695e07e56831ede0b24178e1f01815da732af
SHA256:
E5F517B6A0ABD3D8F112BE77A939ACCFC244266A52670C914179AFAD47BF26F0
File Size:
141.31 KB, 141312 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have exports table
- File doesn't have resources
- File doesn't have security information
- File is 64-bit executable
- File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
- File is either console or GUI application
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Traits
- fptable
- GetConsoleWindow
- No Version Info
- x64
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 504 |
|---|---|
| Potentially Malicious Blocks: | 5 |
| Whitelisted Blocks: | 499 |
| Unknown Blocks: | 0 |
Visual Map
0
0
0
0
0
0
0
0
0
x
x
0
0
0
0
x
x
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
2
0
0
0
0
0
1
0
1
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Agent.KPDA
- ClipBanker.FG
- Exploit.X
- Farfli.DH
- Havoc.L
Show More
- Injector.FSC
- Kryptik.JUA
- Kryptik.OSA
- Kryptik.PFU
- Kryptik.PFV
- Kryptik.UP
- ShellcodeRunner.KA
- ShellcodeRunner.KD
- ShellcodeRunner.KJ
- Trojan.Agent.Gen.JC
- Trojan.Downloader.Gen.CQ
- Trojan.Kryptik.Gen.GQ
- Trojan.Kryptik.Gen.RL
- Vidar.R
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| c:\users\user\downloads\temp.log | Generic Write,Read Attributes |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\content::cacheprefix | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\cookies::cacheprefix | Cookie: | RegNtPreCreateKey |
Show More
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\history::cacheprefix | Visited: | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
|
| Anti Debug |
|
| User Data Access |
|