Trojan.Farfli.KB
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 2,281 |
| Threat Level: | 80 % (High) |
| Infected Computers: | 539 |
| First Seen: | June 17, 2021 |
| Last Seen: | April 15, 2026 |
| OS(es) Affected: | Windows |
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.Farfli.KB |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
d93549d43335c8f7d2faacd4e4195f71
SHA1:
16c6c08b60a1462df30d56634dcbbc0f4d1129fd
SHA256:
16EC3C2BA9B20D5C5CC1FB33ADAE2737A264D228B25E0FC4FFAC05644F7E60E5
File Size:
2.90 MB, 2903040 bytes
|
|
MD5:
9c8544e86669d28dda0a9f5a179685ed
SHA1:
f085edcf75a012008bd9ebca479fca6064097835
SHA256:
1392D2D77EEE9DD61A5A193293AA26A71FC8F5E7E21F28F37CACD23A84E91E7B
File Size:
3.27 MB, 3270848 bytes
|
|
MD5:
677d7de6a4917233a49d6b9d5f9571bc
SHA1:
ac90a705903cd195ed8e10c7249cff2dcaa26271
SHA256:
80733E33A2E9770CBAE46AB20081FB371A54C95E09D448070053D657CB76187D
File Size:
3.27 MB, 3271392 bytes
|
|
MD5:
6c258ede51ca851d7474b13d72c3b5a9
SHA1:
13218c48fa4d6a7a5d6f6aa889ca7e8202c580b2
SHA256:
D18233940E7F17A19FAD4FC9E3A655FDE25562E88AA55616AE6C0458E05E9463
File Size:
2.93 MB, 2929152 bytes
|
|
MD5:
52d9a7790512ed38ef69b498c8b75999
SHA1:
57f269d8caba2da1c7f5e94ae861cda0ee639de5
SHA256:
FFC78DE86BB8A7197E8452B6CEB7BFDB3661529D15AB9985971ABEB078A36F51
File Size:
931.84 KB, 931840 bytes
|
Show More
|
MD5:
eb9af86e9a93187446cb5ef20e584c97
SHA1:
354d8074c779b98e069ef799c0f6ad64d1db3372
SHA256:
ABF6EB9944ECC2B2BBF917E8EB1D2808A0B2039012FE9FCA2E258A0EE44348B4
File Size:
3.56 MB, 3556864 bytes
|
|
MD5:
4c79adf4985b0eed816b2e50c492ceb9
SHA1:
043431f5763437d46e5be6ca2c89541e33194a08
SHA256:
781345A557D69E924E1007CFEDE159345BBB599B3A8728BFEA2F21D97DBE7840
File Size:
2.90 MB, 2903040 bytes
|
|
MD5:
7673ce5cf2caf383ceff51d68cfd6c56
SHA1:
d09be1ab49b8b845ba5179a24a87f03fb4a61e94
SHA256:
6F54E4939DC191A41B81A52D73B157E55D42531CF0E5A234F1AF1AF1BC67BB82
File Size:
2.97 MB, 2969088 bytes
|
|
MD5:
862a549a273f8651b9fd24dbc1b58856
SHA1:
e1c553b4500a34a085d499554ac7bb91f47a5c9b
SHA256:
5BFF95F95F1656E0635EB1C2FBB47041048741427E8CCEC36CA01294B6A5C3BB
File Size:
1.83 MB, 1826304 bytes
|
|
MD5:
fbc2bad053e616dc9a35a65b8e8aa15d
SHA1:
38293f6c1d5f845fc846979e152e0b2619360da2
SHA256:
1441492770212A5FBF330E48A3EACB918E2E523F436E1C7D7320F44657C49163
File Size:
2.66 MB, 2663472 bytes
|
|
MD5:
a4c0265147850c2ef6c99798373314c1
SHA1:
a0504d91bd6df5b49d1892e63a002afde6fedfd0
SHA256:
7742267427E53623E5D8544E1D6F9DBC8877C875B645AD6B4B781EAA1006518A
File Size:
3.23 MB, 3225600 bytes
|
|
MD5:
59566fb43eefcff1b97022463e712add
SHA1:
5b52ae83ce955d96c1e06fef4fe703d27fbac527
SHA256:
F7F0BC515007ADF0A4AED1933F0B00C0E03250D99AE87D05EF0324D93A82E24B
File Size:
2.90 MB, 2903040 bytes
|
|
MD5:
0aa9a133eed89e9f4e3d7c4c85ec5c16
SHA1:
cbba42223e2c49e5c7deb0eb8ad4fc32cf07f6ff
SHA256:
BCAE52A91168D640B2DF799FD14C12CB0096DEA423A6D9CA3A22547797FA65DC
File Size:
4.36 MB, 4360192 bytes
|
|
MD5:
42e63ac5dc385723c7d1d415d70e8c8d
SHA1:
d2df8b2703ea95b7b607bab36ada68c6d2fae8a8
SHA256:
95A3F9260E4D46DA03F46749649BB0267B321F65AF83A85A5DA3CC9C681908A5
File Size:
2.90 MB, 2900992 bytes
|
|
MD5:
818f26dbf39b2d869eb2333eb0fb9ee3
SHA1:
c43ff769f0c5dc83c1bd6f376ca1e8eeab7e9609
SHA256:
A22E076F96C2B9A06B5C4F94F8ED21EF03DD8388743B93C5A83717C621F74CC0
File Size:
2.65 MB, 2647552 bytes
|
|
MD5:
a2b9ae8f0ccd124d66567e5546f7dcf0
SHA1:
d51aa625c5441e3f0ca53024a562e4eec577c784
SHA256:
0DA24EDE90A745D70B825C906020F05937825699673F77171101551AC933B163
File Size:
4.80 MB, 4803072 bytes
|
|
MD5:
54b0353f6f1f5940f0289b4a0f47e470
SHA1:
661ffe4084390d12267b1485b42f4b16e2a39743
SHA256:
804B475D87374EB149DA9756A1E9AEFBEA4AC21A632E137AA5A2B2CFDE35A3B3
File Size:
2.90 MB, 2901504 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File has been packed
- File has exports table
- File is 32-bit executable
- File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
- File is either console or GUI application
Show More
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Comments |
|
| Company Name |
|
| File Description |
|
| File Version |
Show More
|
| Internal Name |
|
| Legal Copyright |
Show More
|
| Original Filename |
|
| Product Date | 2016-10-28 |
| Product Name |
|
| Product Version |
Show More
|
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| Foxit Software Incorporated | DigiCert EV Code Signing CA (SHA2) | Self Signed |
| Foxit Software Incorporated | Starfield Root Certificate Authority - G2 | Root Not Trusted |
| Siemens AG | VeriSign Class 3 Public Primary Certification Authority - G5 | Hash Mismatch |
File Traits
- Default Version Info
- dll
- HighEntropy
- imgui
- Installer Version
- packed
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 10,891 |
|---|---|
| Potentially Malicious Blocks: | 8 |
| Whitelisted Blocks: | 10,844 |
| Unknown Blocks: | 39 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Agent.DJB
- Agent.TRB
- Agent.TRC
- Debris.F
- Downloader.Agent.XD
Show More
- Downloader.Agent.XE
- Farfli.KB
- KillMBR.BD
- Kryptik.FAXC
- Mulinex.C
- Ursnif.AD
- Ursnif.XB
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
|
| Process Shell Execute |
|
| Anti Debug |
|
| User Data Access |
|
| Other Suspicious |
|
| Process Manipulation Evasion |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\16c6c08b60a1462df30d56634dcbbc0f4d1129fd_0002903040.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\f085edcf75a012008bd9ebca479fca6064097835_0003270848.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\ac90a705903cd195ed8e10c7249cff2dcaa26271_0003271392.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\13218c48fa4d6a7a5d6f6aa889ca7e8202c580b2_0002929152.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\354d8074c779b98e069ef799c0f6ad64d1db3372_0003556864.,LiQMAxHB
|
Show More
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\043431f5763437d46e5be6ca2c89541e33194a08_0002903040.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\d09be1ab49b8b845ba5179a24a87f03fb4a61e94_0002969088.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\5b52ae83ce955d96c1e06fef4fe703d27fbac527_0002903040.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\d2df8b2703ea95b7b607bab36ada68c6d2fae8a8_0002900992.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\d51aa625c5441e3f0ca53024a562e4eec577c784_0004803072.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\661ffe4084390d12267b1485b42f4b16e2a39743_0002901504.,LiQMAxHB
|