Malware

What is “Exploit.Win32.Shellcode.agda”?

Malware Removal

The Exploit.Win32.Shellcode.agda is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Exploit.Win32.Shellcode.agda virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • At least one process apparently crashed during execution
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • NtSetInformationThread: attempt to hide thread from debugger
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • Performs HTTP requests potentially not found in PCAP.
  • HTTPS urls from behavior.
  • Starts servers listening on 127.0.0.1:0
  • Enumerates the modules from a process (may be used to locate base addresses in process injection)
  • Reads data out of its own binary image
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Uses Windows utilities to enumerate running processes
  • Authenticode signature is invalid
  • A scripting utility was executed
  • Uses Windows utilities for basic functionality
  • Uses Windows utilities for basic functionality
  • Detects Sandboxie through the presence of a library
  • Detects Avast Antivirus through the presence of a library
  • Behavioural detection: Injection (Process Hollowing)
  • Executed a process and injected code into it, probably while unpacking
  • Behavioural detection: Injection (inter-process)
  • Checks for the presence of known windows from debuggers and forensic tools
  • Created a process from a suspicious location
  • Collects and encrypts information about the computer likely to send to C2 server
  • Installs itself for autorun at Windows startup
  • CAPE detected the OnlyLogger malware family
  • Checks for the presence of known devices from debuggers and forensic tools
  • Checks the presence of disk drives in the registry, possibly for anti-virtualization
  • Detects VirtualBox through the presence of a device
  • Attempts to modify proxy settings
  • Attempts to disable Windows Defender
  • Attempts to modify Windows Defender using PowerShell
  • Harvests cookies for information gathering
  • Attempts to execute suspicious powershell command arguments
  • Uses suspicious command line tools or Windows utilities

How to determine Exploit.Win32.Shellcode.agda?


File Info:

name: 26C9D8E27B58A137F20A.mlw
path: /opt/CAPEv2/storage/binaries/567627b50f92ae9709dcf27ef4bb520d7c246cd99ff9ca20dc467999912b2d71
crc32: D1F50E5B
md5: 26c9d8e27b58a137f20afc304b25cdf6
sha1: c119a326cdc4728fdba89f070afd4ed79b57e455
sha256: 567627b50f92ae9709dcf27ef4bb520d7c246cd99ff9ca20dc467999912b2d71
sha512: cb06a63f3285e8c62ae88cc1ac7734f05b3bb386c7faec6d888eea02224d64c5ce7c285a95b493e99ec54aa38f8a14575cd997ef3b919be1f9deedca1e82ee6f
ssdeep: 98304:JMY/yqYebvim3LZ5wKtRl+a2gA5nw4hWAcAyVDFLPGCEtrUsQPPMI6rWUzCdPLQw:JMY3RvlLDw0+tlrhly1dPz8900WSYPLz
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T19C5633847156CEDEC5F30FB01A532629EE12150676A4C64608A3F305BBF493F6B35BEA
sha3_384: 406c52473de51f9e6ba93d178bb1cba599cd520a4fbcb2875d06fb72f1c3ae4ef835f1f46d97f4ce3a857cb3efb6abbe
ep_bytes: 81ecd40200005356576a205f33db6801
timestamp: 2020-08-01 02:44:18

Version Info:

0: [No Data]

Exploit.Win32.Shellcode.agda also known as:

LionicTrojan.Win32.Stealer.l!c
Elasticmalicious (high confidence)
MicroWorld-eScanDropped:Trojan.GenericKD.48162823
FireEyeGeneric.mg.26c9d8e27b58a137
CAT-QuickHealTrojan.Smalldownloader
ALYacDropped:Trojan.GenericKD.48162823
CylanceUnsafe
SangforSpyware.Win32.Stealer.gen
BitDefenderDropped:Trojan.GenericKD.48162823
Cybereasonmalicious.27b58a
CyrenW32/Kryptik.GAL.gen!Eldorado
SymantecTrojan.Gen.MBT
ESET-NOD32multiple detections
APEXMalicious
ClamAVWin.Malware.Barys-9859499-0
KasperskyExploit.Win32.Shellcode.agda
AlibabaTrojanPSW:Win32/Stealer.ab262ede
NANO-AntivirusRiskware.Win32.PSWTool.hqsnsl
TencentWin32.Trojan.Multiple.Hssv
EmsisoftDropped:Trojan.GenericKD.48162823 (B)
ComodoApplicUnwnt@#1oskvm236onaf
DrWebTrojan.PWS.Siggen3.10810
TrendMicroTrojan.MSIL.ANTILOADR.SMPAO
McAfee-GW-EditionBehavesLike.Win32.Generic.tc
SophosTroj/Krypt-FV
AviraHEUR/AGEN.1144141
Antiy-AVLTrojan/Generic.ASMalwS.3511D0F
KingsoftWin32.Hack.Agent.(kcloud)
GDataDropped:Trojan.GenericKD.48162823
CynetMalicious (score: 100)
McAfeeArtemis!26C9D8E27B58
MAXmalware (ai score=83)
VBA32TScope.Trojan.MSIL
MalwarebytesTrojan.MalPack.GS
PandaTrj/CI.A
TrendMicro-HouseCallTROJ_GEN.R002C0WAN22
RisingDropper.Agent/NSIS!1.D805 (CLASSIC:bWQ1OotFailXtMqtelU8C9TfYNY)
IkarusTrojan-Downloader.MSIL.Tiny
FortinetW32/Kryptik.HOEF!tr
BitDefenderThetaGen:NN.ZemsilF.34182.am0@aOvQ9eg
AVGWin32:Trojan-gen

How to remove Exploit.Win32.Shellcode.agda?

Exploit.Win32.Shellcode.agda removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment