Trojan.Detroie.A
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 8,905 |
| Threat Level: | 80 % (High) |
| Infected Computers: | 68 |
| First Seen: | May 3, 2017 |
| Last Seen: | February 23, 2026 |
| OS(es) Affected: | Windows |
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.Detroie.A |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
eebd9989b84ced0786baaf7f9c97d765
SHA1:
8512d09aba8bf8bdea41efd57f5f129d745a655a
SHA256:
ADDCCBABEE5BFAC86B79769B7E6F902730650D64376FDF7CA3DC294A46787B89
File Size:
1.11 MB, 1114791 bytes
|
|
MD5:
149788fa1d4687338c75ef702e4cfd36
SHA1:
bdc265a561934dbbc157317408c473ba510b019b
SHA256:
82F80F889989F72AE84DFD7239CF7CDD382E61BAEF229C64AE08F20D2B3D04C9
File Size:
1.74 MB, 1738240 bytes
|
|
MD5:
44352061f498f0dc28b1a664a1f0ff21
SHA1:
e2a06f8d9d3aa858bc8d9f60d76aeb715cb3d929
SHA256:
E49EA3552B386B5CB71FDD7CBC7777839D287D109F4A86F6DFF0411F32F3F4F7
File Size:
859.52 KB, 859522 bytes
|
|
MD5:
2f0506133f43187cb10cd47e43f0ff20
SHA1:
f32d4e658f212d0d026e0a43258f9e6681253aea
SHA256:
C87F7BD3A2DF6FA29FE47E5E64A75551BB3224349025F754D3C1716337EE58D4
File Size:
315.39 KB, 315392 bytes
|
|
MD5:
a8b18483585f87c85a7a3e787769afab
SHA1:
ac007fa7da070cb2798a2cf33956bb2cb316d186
SHA256:
DCA0E45844BCAC83ADB43FF0B675E0F3CFFBF9CB876FA4BEA71B56B0A82F4F24
File Size:
1.68 MB, 1678848 bytes
|
Show More
|
MD5:
931556ca1994f95c12fe30aafdce83a0
SHA1:
b886d2a06a11cbd9b4c4b696e9e3beed6173bd22
SHA256:
73ACA713C737E8B6200163EDFB2FF1CBF96C1A492DF12712DD1F7B649BDB8BC7
File Size:
629.76 KB, 629756 bytes
|
|
MD5:
334a9a6acd34f9bfde85426a4092af01
SHA1:
7526666a760c6e3e16bb579f6080638afb074aca
SHA256:
816A194A653CA0232C111AD720F694286D6DFB708B4BA5B6C507973577122F51
File Size:
1.67 MB, 1671168 bytes
|
|
MD5:
e91608123b383ba279c7311e98b60495
SHA1:
74527de209c147c87fc2037895eed8810b31d936
SHA256:
0D4E0711F46B08FE37795169121640AD708F96C351F2F43536F997EAEF127E08
File Size:
362.50 KB, 362496 bytes
|
|
MD5:
822c9db7c64b0e07cd3b2a5e2a59a7b6
SHA1:
3b2def2d0a11ab61e80084c3863163df74851ae8
SHA256:
990C05DDEABD3E141600F8CFE8783C29E3576B174942B4A7AAA88A18554C64F9
File Size:
2.16 MB, 2156544 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File has been packed
- File has exports table
- File has TLS information
- File is 32-bit executable
- File is either console or GUI application
Show More
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Company Name | Slaven Radic |
| File Description | Poco Executable |
| File Version | 1.2.0.601 |
| Legal Copyright | © 1998-99 by Slaven Radic |
| Original Filename | poco.exe |
| Product Name | Poco |
| Product Version | 1.2 |
| U R L | http://www.pocomail.com/ |
File Traits
- ASPack v2.1
- HighEntropy
- No Version Info
- packed
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 5,580 |
|---|---|
| Potentially Malicious Blocks: | 225 |
| Whitelisted Blocks: | 4,303 |
| Unknown Blocks: | 1,052 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe\dav rpc service | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| \device\namedpipe\gmdasllogger | Generic Write,Read Attributes |
| \device\namedpipe\srvsvc | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| \device\namedpipe\wkssvc | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\microsoft\windows\explorer\iconcache_16.db | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\microsoft\windows\explorer\iconcache_idx.db | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\gl_3177.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\gl_f3e6.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glf3591.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\glf3591.tmp | Synchronize,Write Data |
Show More
| c:\users\user\appdata\local\temp\glf35b1.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\glf35b1.tmp | Synchronize,Write Data |
| c:\users\user\appdata\local\temp\glff7f0.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\glff7f0.tmp | Synchronize,Write Data |
| c:\users\user\appdata\local\temp\glff810.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\glff810.tmp | Synchronize,Write Data |
| c:\users\user\appdata\local\temp\glg3590.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glgf7df.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\~glh0002.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\~glh0003.tmp | Generic Write,Read Attributes |
| c:\windows\syswow64\glbsinst.%$d | Generic Write,Read Attributes |
| c:\windows\~glc0000.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\windows\~glh0000.tmp | Generic Write,Read Attributes |
| c:\windows\~glh0001.tmp | Generic Write,Read Attributes |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKCU\software\microsoft\windows\currentversion\explorer\mountpoints2\##10.200.31.10#amas::_labelfromdesktopini | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Anti Debug |
|
| User Data Access |
|
| Network Winsock2 |
|