Threat Database Trojans Trojan.Downloader.Gen.AT

Trojan.Downloader.Gen.AT

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 11,156
Threat Level: 80 % (High)
Infected Computers: 18
First Seen: November 21, 2025
Last Seen: May 11, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.Downloader.Gen.AT
Signature status: Hash Mismatch

Known Samples

MD5: 33d9a545b0a944a95c2dc66b5c609cae
SHA1: 1b81f22616d1eb960b35fd5a3a2d4424cdb82979
SHA256: 25512075F8D85D5730E74C4046812321E3E1F242AB5AA6FED7D945224F7B3926
File Size: 224.26 KB, 224256 bytes
MD5: 4409c19165a13a56434eaa51c429713f
SHA1: 1a778f4dae1a6e5671d0dbdf4786110ab81dd3ce
SHA256: 14B8AEF16366278AC544609EF39EF7B9C8551B7FF6F11E8FADF2FA7F6F535D4A
File Size: 662.51 KB, 662512 bytes
MD5: 075c2e5ffb191a70496da05cd49bbeac
SHA1: 5bb1dd68f8df7a6060aef7aa61a88fd49012de62
SHA256: 9DE2D3D23EDB353F63CC8BC9B959007CEAA272B2E73AC69B8A24C989ABEDF71A
File Size: 797.46 KB, 797456 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have security information
  • File has exports table
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Comments 32 bit SQLite DLL compiled by www.netscantools.com
Company Name www.sqlite.org
File Description
  • sqlite3 Dynamic Link Library
  • WS_Log Dynamic Link Library
File Version
  • 4, 2, 5, 7
  • 3.31.1.0
Internal Name
  • sqlite3
  • WS_Log
Legal Copyright
  • Copyright (C) 2008
  • Copyright (C) 2020
Original Filename
  • sqlite3.dll
  • WS_Log.dll
Private Build for use with NetScanTools Products and Managed Switch Port Mapping Tool
Product Name
  • sqlite3 Dynamic Link Library
  • WS_Log Dynamic Link Library
Product Version
  • 4, 2, 5, 7
  • 3.31.1.0
Special Build Compiled by Northwest Performance Software, Inc. using Visual Studio 2012

Digital Signatures

Signer Root Status
Plex, Inc. DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1 Hash Mismatch
Northwest Performance Software, Inc. Sectigo RSA Code Signing CA Hash Mismatch

File Traits

  • dll
  • HighEntropy
  • x86

Block Information

Total Blocks: 2,706
Potentially Malicious Blocks: 22
Whitelisted Blocks: 1,964
Unknown Blocks: 720

Visual Map

0 0 0 0 x x x ? ? ? ? ? ? ? ? ? 0 0 0 0 0 0 0 ? 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 ? 0 ? ? 0 0 0 ? 0 0 0 1 0 0 0 ? 0 0 0 0 0 0 0 0 ? 0 ? 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 ? 0 0 0 0 0 0 ? 0 0 0 0 ? 0 0 0 ? 0 0 0 0 ? 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x x x x 0 0 0 0 0 x x x 0 ? ? ? 0 0 x x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 1 ? 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 ? 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 ? 0 0 0 ? 0 0 ? 0 ? 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 ? 0 0 ? 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 ? 0 0 ? 0 0 0 0 0 0 0 0 0 0 ? ? 0 0 0 ? ? 0 ? 0 ? ? 0 0 0 ? 0 ? 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 ? 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 ? 0 0 ? ? 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 ? ? 0 ? 0 0 0 0 0 0 0 0 0 ? ? ? 0 ? 0 0 ? ? 0 0 0 0 0 0 0 0 0 0 ? ? 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 0 0 ? ? 0 0 ? 0 ? 0 0 0 ? ? 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 ? 0 ? ? 0 ? ? ? ? 0 0 ? 0 ? ? ? 0 ? ? 0 0 0 0 0 ? ? ? ? ? 0 ? 0 ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 ? ? 0 0 0 ? 0 ? ? 0 ? ? ? 0 ? ? ? ? 0 ? 0 ? 0 0 0 ? 0 ? 0 ? ? 0 0 ? ? 0 0 ? x 0 0 0 0 0 ? 0 ? 0 0 0 0 ? 0 ? 0 ? ? 0 1 1 0 ? ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 ? 0 ? 0 0 0 0 0 0 0 0 ? 0 0 0 0 ? 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 ? ? 0 0 0 0 ? ? 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 ? 0 0 0 0 ? 0 ? ? ? 0 ? ? 0 0 ? 0 ? ? ? 0 0 0 0 ? 0 ? ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 ? 0 ? 0 0 0 ? 0 0 0 0 0 0 ? 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 ? ? ? ? ? ? ? ? ? ? 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 ? 0 ? ? ? ? 0 ? 0 0 0 0 0 0 0 0 ? 0 0 0 ? ? 0 ? ? ? ? ? 0 ? ? 0 0 ? 0 0 0 0 0 0 ? 0 0 0 0 ? ? 0 0 0 0 0 0 0 ? 0 0 ? 0 0 0 0 0 0 ? 0 0 0 0 0 0 ? 0 0 0 ? 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 ? ? 0 0 0 0 0 0 0 0 0 ? ? ? 0 0 ? 0 0 0 ? ? 0 0 0 0 ? 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? 0 0 ? 0 ? ? 0 ? 0 0 ? 0 0 0 ? ? ? 0 ? ? 0 0 ? ? ? 0 0 ? ? 0 0 0 0 0 0 0 ? ? ? 0 0 0 0 0 0 0 0 ? ? ? ? ? 0 ? 0 0 ? ? ? 0 0 0 ? ? ? 0 0 0 0 ? 0 0 0 ? 0 ? 0 ? 0 0 0 ? ? ? ? 0 ? 0 ? 0 0 0 0 ? 0 ? ? ? ? 0 0 0 0 0 0 0 0 0 0 0 ? ? ? 0 0 0 ? ? 0 0 ? 0 ? 0 0 0 ? 0 ? ? 0 ? 0 ? ? ? ? ? ? 0 0 0 ? ? 0 ? ? 0 ? ? ? ? ? 0 0 0 0 0 ? ? 0 0 0 ? ? ? ? 0 0 ? 0 0 0 0 ? ? ? x ? ? 0 0 0 0 0 0 0 0 0 ? 0 0 ? ? ? ? ? 0 0 ? ? ? 0 0 0 0 0 ? ? 0 ? ? 0 0 0 ? ? 0 0 0 ? ? 0 ? 0 0 0 0 ? 0 ? ? ? ? 0 ? 0 ? ? 0 0 0 ? 0 ? ? 0 0 0 ? 0 ? ? 0 ? 0 0 0 0 0 0 0 0 ? ? ? 0 ? 0 0 0 0 0 0 0 0 0 ? 0 ? 0 ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 ? 0 0 0 0 ? 0 ? 0 0 0 ? 0 ? 0 0 ? 0 0 ? ? ? 0 ? 0 0 ? 0 x ? 0 0 ? 0 0 0 0 0 0 ? ? 0 ? 0 ? ? 0 ? ? ? 0 ? 0 0 0 0 0 0 ? ? ? ? ? ? 0 0 0 0 0 0 ? ? 0 0 0 ? 0 0 ? ? 0 0 0 0 0 ? 0 0 0 ? ? 0 0 ? 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 ? 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 ? ? 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? ? ? ? 0 ? 0 0 0 0 0 ? 0 0 0 0 0 0 0 ? 0 0 ? 0 ? 0 0 ? ? ? ? ? 0 0 0 0 0 0 0 0 0 ? ? 0 ? 0 ? 0 0 0 0 0 0 ? 0 0 0 0 0 ? 0 ? 0 0 ? 0 ? ? 0 0 0 0 ? ? ? ? 0 ? ? 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 ? ? ? 0 ? ? 0 ? ? ? ? ? ? ? 0 ? 0 0 ? ? ? 0 ? ? 0 ? 0 0 ? 0 ? ? 0 ? 0 0 ? 0 0 ? 0 0 0 0 0 ? 0 0 0 0 0 ? 0 ? ? 0 0 0 ? ? ? ? ? 0 ? 0 ? 0 0 0 ? 0 ? ? ? 0 ? ? ? ? 0 ? ? ? 0 ? 0 0 ? ? 0 0 0 0 0 ? ? ? 0 0 ? 0 ? 0 ? 0 0 ? 0 0 ? ? ? 0 0 0 ? 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 ? ? 0 0 0 ? ? ? 0 ? 0 0 0 ? 0 0 ? 0 0 0 ? 0 0 0 ? 0 0 0 ? ? 0 ? ? ? 0 0 ? 0 0 0 ? 0 ? 0 0 ? ? ? 0 ? ? ? ? ? ? ? ? ? ? 0 ? 0 ? ? ? ? ? ? ? ? 0 ? ? ? ? ? ? ? 0 0 ? ? 0 ? 0 0 ? ? 0 ? 0 0 0 ? 0 0 ? ? ? ? 0 ? ? 0 0 0 0 0 0 0 ? ? 0 0 ? ? 0 0 ? ? 0 ? ? 0 0 ? 0 0 0 ? 0 ? ? 0 0 0 0 0 ? 0 0 0 ? ? 0 0 0 ? ? 0 0 0 0 0 ? ? ? ? 0 ? ? 0 ? ? ? ? ? ? 0 0 0 0 ? 0 0 ? 0 0 ? ? ? ? 0 ? 0 ? 0 0 0 0 ? ? ? 0 ? ? 0 0 0 0 0 0 0 ? ? ? 0 0 0 ? 0 ? ? ? ? ? ? 0 ? 0 0 0 ? 0 0 ? 0 0 ? ? 0 0 0 ? ? ? ? 0 ? ? 0 ? 0 ? 0 0 ? 0 ? 0 0 ? 0 0 0 ? ? ? 0 ? ? 0 0 0 ? ? 0 ? 0 0 ? 0 ? 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 ? ? ? ? 0 ? 0 ? 0 0 ? ? 0 0 0 0 ? ? ? ? 0 ? ? ? ? 0 0 ?
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtQueryAttributesFile
Show More
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWriteFile
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Anti Debug
  • NtQuerySystemInformation

Shell Command Execution

C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\1b81f22616d1eb960b35fd5a3a2d4424cdb82979_0000224256.,LiQMAxHB
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\1a778f4dae1a6e5671d0dbdf4786110ab81dd3ce_0000662512.,LiQMAxHB
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\5bb1dd68f8df7a6060aef7aa61a88fd49012de62_0000797456.,LiQMAxHB

Trending

Most Viewed

Loading...