Threat Database Trojans Trojan.Agent.BRVGen

Trojan.Agent.BRVGen

By Domesticus in Trojans

Threat Scorecard

Popularity Rank: 23,489
Threat Level: 90 % (High)
Infected Computers: 139
First Seen: October 4, 2012
Last Seen: January 15, 2026
OS(es) Affected: Windows

Trojan.Agent.BRVGen is a Trojan that is linked to a malicious web address, which is blocked because it doesn't conform to website authorization rules. If the infected domain is not blocked, it downloads and installs malware threats onto the victimized PC before it is banned. Trojan.Agent.BRVGen disguises a restoring element in computer memory. Trojan.Agent.BRVGen can restore its components although it has been successfully uninstalled from the corrupted PC.

Analysis Report

General information

Family Name: Trojan.Razy.N
Signature status: No Signature

Known Samples

MD5: 2567af44c59636ab332f3f6655985aef
SHA1: 89e50d3edb8f04ded260c1dfcaa3ba07fb363ef5
SHA256: F6A3C292935DC510D5286EE264E94300C4DB94281E3765A2FEE4F74E0F2527F2
File Size: 8.47 MB, 8474670 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

File Traits

  • dll
  • HighEntropy
  • x86

Files Modified

File Attributes
\device\namedpipe\gmdasllogger Generic Write,Read Attributes
c:\users\user\appdata\local\microsoft\windows\explorer\iconcache_16.db Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\microsoft\windows\explorer\iconcache_idx.db Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\insbcae.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-nfjcj.tmp\_shfoldr.dll Generic Read,Write Data,Write Attributes,Write extended,Append data

Windows API Usage

Category API
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Service Control
  • OpenSCManager

Shell Command Execution

C:\Users\Aaxcroyg\AppData\Local\Temp\INSBCAE.tmp /SL3 $6033E c:\users\user\downloads\89e50d3edb8f04ded260c1dfcaa3ba07fb363ef5_0008474670 8433190 8444555 61440

Trending

Most Viewed

Loading...