Trojan.Ekstak.CA
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 10,568 |
| Threat Level: | 90 % (High) |
| Infected Computers: | 518 |
| First Seen: | July 24, 2009 |
| Last Seen: | February 2, 2026 |
| OS(es) Affected: | Windows |
Table of Contents
Aliases
15 security vendors flagged this file as malicious.
| Antivirus Vendor | Detection |
|---|---|
| TrendMicro | WORM_UTOTI.RC |
| Symantec | W32.SillyDC |
| Sunbelt | Worm.Win32.Autoit.P |
| Prevx1 | Malicious Software |
| Panda | W32/Autorun.SF |
| NOD32 | Win32/Autoit.BA |
| McAfee | Generic.dx |
| Ikarus | Worm.Win32.AutoIt |
| GData | Win32.Worm.Autoit.P |
| Fortinet | W32/Autorun.H!worm |
| eTrust-Vet | Win32/Vishawon.A |
| eSafe | Suspicious File |
| Comodo | Worm.Win32.AutoIt.i |
| ClamAV | Trojan.Autoit-14 |
| CAT-QuickHeal | Worm.Autoit.i |
SpyHunter Detects & Remove Trojan.Ekstak.CA
File System Details
| # | File Name | MD5 |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
|---|---|---|---|
| 1. | Msmsgs.exe | 7eae3ace4efaf2ce46234688451712d3 | 0 |
Analysis Report
General information
| Family Name: | Trojan.Ekstak.CA |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
f8ab2927365e50a9b4aad8573bc2623c
SHA1:
6580b7c4f355be5723e5d46878336d747f330212
SHA256:
AD86AF432285CD2D91E4B91FFEBAFB8386AF1851D95E0A229539DDDE2C45D540
File Size:
3.63 MB, 3633149 bytes
|
|
MD5:
1844c432a530d16754cd179b8f6653ea
SHA1:
0b09b8512247559c0dd8f39d6927755113d2a0f6
SHA256:
50EEFF1C9C8035F42B78A1DA89CA89B56AC7609C757FEBC19FF84525CB1C6126
File Size:
4.36 MB, 4355958 bytes
|
|
MD5:
c45c7f7fd2a255cbcf6f473c2158d877
SHA1:
c03a9c32f26cf00ec6f0e470ff7dd99b4275a73a
SHA256:
83DF37EB035FDC46EA03AC91279B1A5E5DEA4BFBCA22BBCBA16C44279E586224
File Size:
2.40 MB, 2401792 bytes
|
|
MD5:
e3f51541c755023733610353a12ac261
SHA1:
2a95c0f2fec456e156de93b8e9565fd884095686
SHA256:
A283E1F38E4F21E6F8750BF448991FEECDE74DD68245DB3435FB3A4F9A462C32
File Size:
5.49 MB, 5487918 bytes
|
|
MD5:
5c95683bdc90a17a62dcce110569ec13
SHA1:
b345b6b1f3e7ba15585c16eafaa4cb1a4ec14f49
SHA256:
86378F6E305CC240AF83DE71EA00C9D7F00ADED6127C6A917DB518A6F9EAF39B
File Size:
5.93 MB, 5933908 bytes
|
Show More
|
MD5:
470515414df7a5b870fd60ec572d4832
SHA1:
9b4d42a1d035002253e145a476623854923da05c
SHA256:
86E1A0B56CC0B1A91D03128B0FE9BE09A74D639E50DA03163D5DD5739ED5E8B6
File Size:
3.39 MB, 3387176 bytes
|
|
MD5:
0c9c9e367d8225d8375000feedc4139f
SHA1:
79a3e3e9548d048239501bbaa3cda52c582b4c70
SHA256:
CACFA94849EEF6B94EBE4F649DDB977E954F699B004A1C6343511E484B34527C
File Size:
5.50 MB, 5495070 bytes
|
|
MD5:
2325bb42aa2e819d54724de263938584
SHA1:
569962f335d7f85de1e3d9a19f3e0bde2fe5e504
SHA256:
7F40EB04442F245D26D14BF22DF67B8BA8F5ED7830E3D4C8744C0BBAD371C5EB
File Size:
3.67 MB, 3671622 bytes
|
|
MD5:
08ec0b5b31ae374574b7a64b3e87b4b9
SHA1:
f669ea0c71615524e9a5f96714dc0478ab9635c1
SHA256:
DEF8603E1094739399420871AC7D96B188AABE32614F43F17AE630BCB8512E54
File Size:
3.39 MB, 3388118 bytes
|
|
MD5:
3905c72665d91077f6ccade1381fd291
SHA1:
1c93d1db2535424710a65bd20bfbef5d90d33b69
SHA256:
43B6A4C588188224657B6B099A1D64A71B6B439A8679C0199765CFCF3E527AF0
File Size:
3.57 MB, 3567578 bytes
|
|
MD5:
e27540ed7dce2b375a39517502c52e12
SHA1:
a0007d47d8e5ee5427daa9798b43ee676d995b86
SHA256:
77093BCC61CF886DDFA38244E9B43322D0EE0E4806DBD791CA9CF17C9336CFCC
File Size:
4.07 MB, 4072448 bytes
|
|
MD5:
1ba78fb463309251903bb4982b291649
SHA1:
37e4ea3e247948c1d86598b1a72904c9ebb8e3bb
SHA256:
C69C21F1E3382CE2DE4F14BABF82A0973753B071BAD64B93A5A4A96DF3D3E5B1
File Size:
4.30 MB, 4304890 bytes
|
|
MD5:
80676b5dad2edb2dc4ead840725b768b
SHA1:
bc8b60af5b62b4f91fb3cd0c536855563b9ea984
SHA256:
124213CAA31122FCA2A2CA1B79A93C43FD2841C2C629F3C87DE3C223907FF44C
File Size:
8.74 MB, 8739655 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File has exports table
- File has TLS information
- File is 32-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
Show More
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Show More
Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Company Name |
|
| File Description |
|
| File Version |
Show More
|
| Internal Name |
|
| Legal Copyright |
|
| Original Filename |
|
| Product Name |
|
| Product Version |
Show More
|
File Traits
- 2+ executable sections
- HighEntropy
- imgui
- No Version Info
- VirtualQueryEx
- x86
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| c:\users\user\appdata\local\temp\is-p65m0.tmp\teamviewer serial key.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\rarsfx0 | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\__tmp_rar_sfx_access_check_5203453 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\rarsfx0\crack.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\crack.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\rarsfx1 | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\rarsfx1\__tmp_rar_sfx_access_check_5204921 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\rarsfx1\teamviewer 15 crack.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\rarsfx1\teamviewer 15 crack.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\rarsfx1\teamviewer serial key.exe | Generic Write,Read Attributes |
Show More
| c:\users\user\appdata\local\temp\rarsfx1\teamviewer serial key.exe | Synchronize,Write Attributes |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Keyboard Access |
|
| Anti Debug |
|
| User Data Access |
|
| Process Manipulation Evasion |
|
| Process Shell Execute |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
(NULL) C:\Users\Qwtlwgbf\AppData\Local\Temp\RarSFX0\Crack.exe
|
(NULL) C:\Users\Qwtlwgbf\AppData\Local\Temp\RarSFX1\TeamViewer 15 Crack.exe
|
(NULL) C:\Users\Qwtlwgbf\AppData\Local\Temp\RarSFX1\TeamViewer Serial Key.exe
|
"C:\Users\Qwtlwgbf\AppData\Local\Temp\is-P65M0.tmp\TeamViewer Serial Key.tmp" /SL5="$5034A,7223725,58368,C:\Users\Qwtlwgbf\AppData\Local\Temp\RarSFX1\TeamViewer Serial Key.exe"
|