Threat Database Stealers Infostealer.Nasdosto

Infostealer.Nasdosto

By ESGI Advisor in Stealers

Threat Scorecard

Popularity Rank: 3,091
Threat Level: 90 % (High)
Infected Computers: 16,635
First Seen: January 23, 2013
Last Seen: April 13, 2026
OS(es) Affected: Windows

Infostealer.Nasdosto is a Trojan that steals information from the corrupted PC. While being run, Infostealer.Nasdosto creates the files on the infected computer system. Infostealer.Nasdosto creates the registry entries so that it can load automatically every time Windows is started. Infostealer.Nasdosto logs keystrokes on the victimized computer system. Infostealer.Nasdosto transfers the collected information to the remote locations.

File System Details

Infostealer.Nasdosto may create the following file(s):
# File Name Detections
1. %System%\ns7dos.exe
2. %System%\ns6dos.exe
3. %System%\ns2dos.exe
4. %System%\nsdos2.exe
5. %System%\ns7dos
6. %System%\ns6dos
7. %System%\ns2dos
8. %System%\nsdos2

Registry Details

Infostealer.Nasdosto may create the following registry entry or registry entries:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\"msdos-debug" = "[HEXADECIMAL CHARACTERS]"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\"msdos-debug2" = "[HEXADECIMAL CHARACTERS]"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\"nsdos-debugg" = "[HEXADECIMAL CHARACTERS]"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\[RANDOM CLSID]\"StubPath" = "[HEXADECIMAL CHARACTERS]"

Analysis Report

General information

Family Name: HEUR.Malware.Win32.Posin
Signature status: Self Signed

Known Samples

MD5: 1be5c07313087d910e639dc0801929a2
SHA1: e030a35ad56e3d74029cfb78fce0d0c7a4c55dc3
SHA256: 195E605256EB7CC8C78562F0D7D5759D58C034912224B5EA3F4295EE87390198
File Size: 731.03 KB, 731035 bytes
MD5: 7773fba6047fb22854871a1e3edbca24
SHA1: b5162ce92f1a648aae732477ddd085cae5998959
SHA256: 27755142F92C63835558575347A9B7058E7FE4C1ADDE60CBBB2188636C261CE7
File Size: 1.89 MB, 1892352 bytes
MD5: b84980709e08e594ff91a429882c1f0b
SHA1: 7200a7e9036396e07d8c5ef32b833cdba0ac0765
SHA256: AD2B4D5E5E8DA589D63AA812B83AB71CEF5CE507BAE9A5E4FA0D97403D01F2B0
File Size: 2.83 MB, 2834944 bytes
MD5: 8c63eba152dff7d2da8bf09e5b3ce7a7
SHA1: 33d16f48b8c838675f277f5e35f219d6146b41bb
SHA256: 43F2F5BE32D92C9263ED76C2D3DC8A434A8E12DCE1A2F27717FAE64894F1423E
File Size: 55.38 KB, 55376 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have resources
  • File doesn't have security information
  • File has been packed
  • File has exports table
  • File has TLS information
  • File is 32-bit executable
Show More
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments Captures movie scenes to single picture files or thumbnail galleries
Company Name Lonking Software, LLC.
File Description Captures movie scenes to single picture files or thumbnail galleries
File Version
  • 2.3.0.23
  • 1.00
Internal Name TJprojMain
Original Filename TJprojMain.exe
Product Name
  • Project1
  • Video Snapshots Genius
Product Version
  • 2.3.0.23
  • 1.00

Digital Signatures

Signer Root Status
ShenZhen Thunder Networking Technologies Ltd. ShenZhen Thunder Networking Technologies Ltd. Self Signed

File Traits

  • 00 section
  • 2+ executable sections
  • dll
  • HighEntropy
  • No Version Info
  • packed
  • upx
  • UPX!
  • x86

Block Information

Total Blocks: 5
Potentially Malicious Blocks: 3
Whitelisted Blocks: 2
Unknown Blocks: 0

Visual Map

x x x 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • HEUR.Malware.Win32.Posin
  • NSPack.Gen
  • PcClient.L

Windows API Usage

Category API
Other Suspicious
  • SetWindowsHookEx
Anti Debug
  • IsDebuggerPresent
  • NtQuerySystemInformation
User Data Access
  • GetUserObjectInformation
Syscall Use
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtQueryAttributesFile
Show More
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWriteFile
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess

Shell Command Execution

C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\33d16f48b8c838675f277f5e35f219d6146b41bb_0000055376.,LiQMAxHB

Trending

Most Viewed

Loading...