SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  MalAgent.J_61495
MalAgent.J_61495 is a Trojan. A Trojan is a program that pretends to have a valid use, but in fact modifies the user's computer in malicious ways. Trojans do not replicate or spread to other computers.

Mutexes created
  • Nothing to report


Directory level activity
    • Nothing to report


    File level activity
      • Nothing to report


      Registry level activity
        • Nothing to report


        Library level activity
        • load - library - KERNEL32
        • load - library - WSOCK32.dll
        • load - library - WINMM.dll
        • load - library - VERSION.dll
        • load - library - COMCTL32.dll
        • load - library - PSAPI.DLL
        • load - library - KERNEL32.dll
        • load - library - USER32.dll
        • load - library - GDI32.dll
        • load - library - COMDLG32.dll
        • load - library - ADVAPI32.dll
        • load - library - SHELL32.dll
        • load - library - ole32.dll
        • load - library - OLEAUT32.dll
        • load - library - KERNEL32.DLL
        • load - library - C:\WINDOWS\system32\rpcss.dll
        • load - library - C:\WINDOWS\system32\uxtheme.dll
        • load - library - uxtheme.dll
        • load - library - ntdll.dll
        • load - library - user32
        • load - library - kernel32
        • load - library - UxTheme.dll
        • load - library - CLBCATQ.DLL
        • load - library - C:\WINDOWS\system32\WINHTTP.dll
        • load - library - oleaut32.dll
        • load - library - ADVAPI32.DLL
        • load - library - ws2_32
        • load - library - wintrust.dll
        • load - library - schannel
        • load - library - crypt32
        • load - library - winhttp.dll
        • load - library - C:\WINDOWS\system32\schannel.dll
        • load - library - oleaut32.dll


        Process API calls used
        • VirtualProtectEx
        • ZwMapViewOfSection
        • NtFreeVirtualMemory
        • NtFreeVirtualMemory


        Registry API calls used
        • RegOpenKeyExW
        • RegQueryValueExW
        • RegCloseKey
        • NtOpenKey
        • RegOpenKeyExA
        • RegQueryValueExA
        • NtQueryValueKey
        • RegEnumValueW
        • RegCloseKey


        System API calls used
        • LdrGetDllHandle
        • LdrGetProcedureAddress
        • LdrLoadDll
        • IsDebuggerPresent
        • LdrGetProcedureAddress


        Filesystem API calls used
        • FindFirstFileExW
        • NtCreateFile
        • NtQueryInformationFile
        • NtSetInformationFile
        • NtReadFile
        • NtDeviceIoControlFile
        • NtDeviceIoControlFile

        Network

        UDP source >> destination
        • 192.168.30.6 >> 8.8.8.8


        TCP source >> destination
        • 192.168.30.6 >> 104.18.48.20



        Domains:
        • paste.ee with IP - 104.18.49.20

        DNS Request:
        • paste.ee

        HTTP Request:
        • NA

        DLL related data
        Number of DLL's imported = 0
        • Nothing to report


        Relevant Information