Threat Database Trojans Trojan.Fugrafa.J

Trojan.Fugrafa.J

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 14,414
Threat Level: 80 % (High)
Infected Computers: 29
First Seen: February 9, 2022
Last Seen: May 2, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.Fugrafa.J
Signature status: No Signature

Known Samples

MD5: 329f22744df2feac7d544fb85bdca0ed
SHA1: 62f108cbdc7d6a8d88457372445fe647b0fd3eeb
SHA256: 9AB00FF35CB7B20FB0407C4738EA4223A20B3C625C66D43FED118AB3DE632D1E
File Size: 2.42 MB, 2415992 bytes
MD5: 98fc6f0c9ffb299ae8a5100b9367fde2
SHA1: fbbf48fb37d4fb381803858045018a2f7809bf43
SHA256: C5861035EC06023555835EA7C5E6C816407086CDC8D92B58DB62D8A5413AB932
File Size: 177.73 KB, 177730 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments
  • Install MPTOOLS and its components
  • Install Services Installers
Company Name
  • Hexagon Mining
File Description
  • HxGN MinePlan™ TOOLS Installation
  • Services Installers Installer
File Version
  • 1.51.0.445
  • ${VERSIONSTRING}
Legal Copyright
  • © Hexagon Mining
  • © Hexagon Mining, Inc.
Product Name
  • HxGN MinePlan™ TOOLS
  • Services Installers
Product Version
  • 3.3.1.1
  • 1.51.0.445

Digital Signatures

Signer Root Status
Hexagon Mining Symantec Class 3 SHA256 Code Signing CA Self Signed

File Traits

  • Installer Manifest
  • Installer Version
  • nosig nsis
  • No Version Info
  • Nullsoft Installer
  • x86

Block Information

Total Blocks: 74
Potentially Malicious Blocks: 14
Whitelisted Blocks: 60
Unknown Blocks: 0

Visual Map

0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 x 0 0 x x 0 x 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 x x x 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Fugrafa.J
  • Trojan.Kryptik.Gen.AGT
  • Zusy.C
  • Zusy.CB

Files Modified

File Attributes
c:\users\user\appdata\local\temp\nsl49e.tmp\installoptions.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsl49e.tmp\iospecial.ini Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\nsl49e.tmp\iospecial.ini Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsl49e.tmp\modern-header.bmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsl49e.tmp\modern-wizard.bmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsv43f.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete
c:\users\user\appdata\local\temp\nsy92c2.tmp\modern-header.bmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\~nsu.tmp\au_.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144

Registry Modifications

Key::Value Data API Name
HKLM\system\controlset001\control\session manager::pendingfilerenameoperations *1\??\C:\Windows\SystemTemp\MicrosoftEdgeUpdate.exe.old5af52*1\??\C:\Windows\SystemTemp\CopilotUpdate.exe.old5af62*1\??\C:\P RegNtPreCreateKey

Windows API Usage

Category API
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation
Process Shell Execute
  • CreateProcess

Shell Command Execution

"C:\Users\Xjmdijcc\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=c:\users\user\downloads\

Trending

Most Viewed

Loading...