Threat Database Trojans Trojan.Spy.Agent.GB

Trojan.Spy.Agent.GB

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 16,524
Threat Level: 80 % (High)
Infected Computers: 18,528
First Seen: July 27, 2021
Last Seen: March 15, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.Spy.Agent.GB
Signature status: No Signature

Known Samples

MD5: dd666b354061e050749e1e6305ea68e0
SHA1: b857e215ceb1c32a097980e8f9362ebe260b407b
File Size: 307.71 KB, 307712 bytes
MD5: 6736ae72c7437a2bd9a29b75a4c4c345
SHA1: e8e7cf291ce91cff16ef4c26ebd2b9cac7dff452
SHA256: 2A9CD95DEA7E44CBA7056A7A0F38C002399E9AF16D0773462F2DD9BB487DA8AF
File Size: 307.71 KB, 307712 bytes
MD5: 02d84037ae71dd704ceef533bd863dc7
SHA1: f4c6ad2149e67513f1275fa8e4c994abd03073fc
SHA256: 93BF7AC25FFFFEDF7F4D560D7C2DA016AA43FA7AE58EBA53C4771357C54C0416
File Size: 324.61 KB, 324608 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have security information
  • File is .NET application
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Assembly Version 1.1.21.1
Comments XHP Booster
Company Name Microsoft Corporation
File Description
  • Win32 Cabinet Self-Extractor
  • XHP
File Version
  • 12.9.1.22
  • 11.00.17763.1 (WinBuild.160101.0800)
Internal Name
  • Steanings.exe
  • Wextract
Legal Copyright
  • XHP Corporation Copyright © 2021
  • © Microsoft Corporation. All rights reserved.
Original Filename
  • Steanings.exe
  • WEXTRACT.EXE .MUI
Product Name
  • Internet Explorer
  • XHP booster
Product Version
  • 12.9.1.22
  • 11.00.17763.1

File Traits

  • .NET
  • Confuser
  • x86

Block Information

Similar Families

  • MSIL.Stealer.RAR

Files Modified

File Attributes
\device\namedpipe\gmdasllogger Generic Write,Read Attributes
c:\users\user\appdata\local\temp\ixp000.tmp\g9207317.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\ixp000.tmp\g9207317.exe Synchronize,Write Attributes
c:\users\user\appdata\local\temp\ixp000.tmp\h6723170.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\ixp000.tmp\h6723170.exe Synchronize,Write Attributes
c:\users\user\appdata\local\temp\ixp000.tmp\tmp4351$.tmp Generic Write,Read Attributes,Delete

Registry Modifications

Key::Value Data API Name
HKLM\software\wow6432node\microsoft\windows\currentversion\runonce::wextract_cleanup0 rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Rxiklikc\AppData\Local\Temp\IXP000.TMP\" RegNtPreCreateKey
HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe ː䁢드ǜ RegNtPreCreateKey

Windows API Usage

Category API
User Data Access
  • GetUserDefaultLocaleName
  • GetUserObjectInformation
Anti Debug
  • IsDebuggerPresent
  • NtQuerySystemInformation
Encryption Used
  • BCryptOpenAlgorithmProvider
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Syscall Use
  • ntdll.dll!NtAccessCheck
  • ntdll.dll!NtAlertThreadByThreadId
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtClearEvent
  • ntdll.dll!NtClose
  • ntdll.dll!NtConnectPort
  • ntdll.dll!NtCreateEvent
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateMutant
Show More
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtCreateSemaphore
  • ntdll.dll!NtDuplicateObject
  • ntdll.dll!NtDuplicateToken
  • ntdll.dll!NtEnumerateValueKey
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenProcessTokenEx
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenSemaphore
  • ntdll.dll!NtOpenThreadTokenEx
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtQueryWnfStateData
  • ntdll.dll!NtReleaseMutant
  • ntdll.dll!NtReleaseSemaphore
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtRequestWaitReplyPort
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtSubscribeWnfStateChange
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtUnmapViewOfSectionEx
  • ntdll.dll!NtWaitForAlertByThreadId
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWorkerFactoryWorkerReady
  • ntdll.dll!NtWriteFile
  • UNKNOWN
Process Terminate
  • TerminateProcess

Shell Command Execution

C:\Users\Rxiklikc\AppData\Local\Temp\IXP000.TMP\g9207317.exe

Trending

Most Viewed

Loading...