Trojan.Guildma.D
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 16,922 |
| Threat Level: | 80 % (High) |
| Infected Computers: | 14 |
| First Seen: | May 8, 2023 |
| Last Seen: | February 18, 2026 |
| OS(es) Affected: | Windows |
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.Guildma.D |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
deb59f750642b0d47bc55d85af5363dd
SHA1:
cfc78b5085675a8eae46414ec47acfd6a5d90998
SHA256:
059396D21EF197ABC4EABDD95A316EF0AA60E90D2F9BC54DE6366D081A6CD4E4
File Size:
4.02 MB, 4024832 bytes
|
|
MD5:
0cc8b23fa9009f45c25431c8ddb97abf
SHA1:
498b6debdeffd32031acd9dcf69f8ed30a6b604a
SHA256:
51FD1D7880ACC5BC2C55A8CDFB0694563CA9332510AE4C55460DA5E2B71013EA
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
4420e980233c7c998e73c3d8af90c454
SHA1:
f16697ff0f5c56bc75ce6164b3e9bf886da370bc
SHA256:
42DD3563156A85D7D3D87F8692EAA365E61524C4A2CF81590D8761F0F8D78BAD
File Size:
8.83 MB, 8834048 bytes
|
|
MD5:
b961accb50211dee0cbfe57fb1ce7995
SHA1:
61e5ffb6f47959b83a65907ed1b4000aba23921c
SHA256:
1409DBC029336CFCF75F3CA5F1A8F9A16D5D10BBD4EE80398AC1D6F2DFA69F2F
File Size:
43.01 KB, 43008 bytes
|
|
MD5:
af7ffff2269084505887933b1b244770
SHA1:
ff80ead53c680d2201eafe5878203b4d12316755
SHA256:
A358E27F5174315FD69C7B58B4B455BF065BF602D04208BC5040904AC92488E8
File Size:
9.78 MB, 9777152 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have security information
- File has exports table
- File is 32-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Traits
- 2+ executable sections
- dll
- VirtualQueryEx
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 16,140 |
|---|---|
| Potentially Malicious Blocks: | 26 |
| Whitelisted Blocks: | 16,112 |
| Unknown Blocks: | 2 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Danabot.DI
- Delf.FC
- Delf.OF
- FotopApps.A
- Guildma.D
Show More
- Injector.XN
- KillMBR.XE
- Ousaban.C
- ShandaAdd.A
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
|
| Process Shell Execute |
|
| Anti Debug |
|
| Process Manipulation Evasion |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\cfc78b5085675a8eae46414ec47acfd6a5d90998_0004024832.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\498b6debdeffd32031acd9dcf69f8ed30a6b604a_0000124928.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\f16697ff0f5c56bc75ce6164b3e9bf886da370bc_0008834048.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\61e5ffb6f47959b83a65907ed1b4000aba23921c_0000043008.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\ff80ead53c680d2201eafe5878203b4d12316755_0009777152.,LiQMAxHB
|