Threat Database Trojans Trojan.Injector

Trojan.Injector

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 2,695
Threat Level: 90 % (High)
Infected Computers: 7,054
First Seen: July 24, 2009
Last Seen: October 29, 2025
OS(es) Affected: Windows

Aliases

15 security vendors flagged this file as malicious.

Antivirus Vendor Detection
AVG Generic28.BQHZ
Fortinet W32/Inject.EFNL!tr
Ikarus Trojan-Ransom.Win32.Gimemo
Microsoft Trojan:Win32/Matsnu
Sophos Troj/Ransom-GV
AntiVir TR/Matsnu.EB.23
BitDefender Trojan.Generic.KDV.648534
Kaspersky Trojan.Win32.Inject.efnl
ClamAV Trojan.Injector-564
Avast Win32:Ransom-JW [Trj]
Symantec Trojan.Ransomlock.P
McAfee Generic VB.iv
CAT-QuickHeal Trojan.Inject.efnl
AVG Dropper.Generic4.BTME
Fortinet W32/Kryptik.AL!tr

File System Details

Trojan.Injector may create the following file(s):
# File Name MD5 Detections
1. file.exe 630c537a75505c775cab7ecb4331fd7f 2,894
2. ohydy.exe 97082e22d22d0233c3827aa800cd8081 212
3. winmsngrn.exe 5ed32336399cfbb32b4ae39eadbe44f4 37
4. server.exe 6a690d6ee9464b247247dc579acaf657 4
5. osecilip.exe 4d069e7d39da2a991161d4ebcfe1665b 4
6. csrss.exe 48f1c9ed58b7948b33886a05c726a3aa 3
7. $Recycle$.exe 8712debe5c53f26f0aa7fe272c5c9254 2
8. mine.exe 4c235cb349b71e7c181bc422162eaeba 2
9. winlogon.exe 4f18ad6462c0318733f3068d5d0072b9 1
10. Windows Defender.exe d7b90f52681ebf50a75bf71b54327f80 1
11. System2.exe 0509c8e423ceca39fddb557d1d3b3195 0
12. msdrive32.exe 4fa0ebf903d127af2756a135372cb0f7 0
13. abuzamnet_enc.exe c26250804673f00acf82ffc3ec7343f9 0
14. inecomm.exe 484304e2739fb533d104654f06956312 0
15. svchost32.exe 13d994fe0816381cd863dbe9a07173a5 0
16. ms87273.exe d5445977d745c8ee312336cbb9905a68 0
17. ndll.exe 9886448ba02b730241b50906c87c97a7 0
18. java.exe 74837b73b89a529f7f4dc1eaa1859754 0
19. cidrive32.exe 2a4fc5debe6c89a772fc08d8f1bfc5de 0
20. sysdiag32.exe f11719cd4d4b54ca7058f5dc80ace01f 0
21. jjdrive32.exe f98711b816003449bdb6b3eb76d280e7 0
22. 730.exe 9ddb3edb042ce8fef5b96117bd4f8cfe 0
23. msvmcls64.exe ca649a0b9242e7f88e4826851dc81728 0
24. scvdll.exe d8720b215ee1147b557538e9eb4208d4 0
25. infocard.exe 3b84173a87de02b6089bf5d0097fa73e 0
26. aca1e6.exe 59f0d4337ee5be50b12a046822f2ef75 0
27. winsvc32.exe 7bbba0f837f7039f560a5504d99f7c9b 0
More files

Registry Details

Trojan.Injector may create the following registry entry or registry entries:
Regexp file mask
%APPDATA%\FUKDd.exe

Analysis Report

General information

Family Name: Trojan.Injector
Signature status: No Signature

Known Samples

MD5: efadae0e3b2815210f3083baee4a7dfd
SHA1: 0d5575069aa91463ba7d68a17708e6cbba5dd231
File Size: 5.68 MB, 5678030 bytes
MD5: deff64d13688820605fe51abeb0613e5
SHA1: 4543389340df1ff3c216fe641b77d8a82cea726f
SHA256: 38AB10F979749560F479AA529445975E69A26AD9B64F07BC41D05E7C7B3F38A0
File Size: 4.72 MB, 4718538 bytes
MD5: 0314b98220bc7f874e21eb4abbfe032a
SHA1: 40952f2868e7771c9945a97022a5728754e9e477
SHA256: 0E661198B199B879C2FA30F2F99D364639B1F9E455105DE82B91B83EF1E3B465
File Size: 5.96 MB, 5958027 bytes
MD5: 5aa15b80cc50ab074302c34e7087330c
SHA1: 36f37a7fc1dfd9f92240302d9b0f8a6af521ad47
SHA256: B934E10B7B0A0744B928D380B34908CFB5E3DC35D2284F517EDA7C6DFB8AC1FC
File Size: 5.68 MB, 5678236 bytes
MD5: 2cfd3da5537439a71f5fb6de3b8668fe
SHA1: 1350893b90506b387db3b5674a20dd31e53dfb8a
SHA256: 20959562EBCDCFCC1E4ABE5E7AA636A7964A01E2FA35FE1931AED3DF1AFEAC20
File Size: 4.75 MB, 4748603 bytes
Show More
MD5: 4abaf2e1e806bd09b8a770c143f71694
SHA1: f6c3c4fe9a39b3e1f4c8796541027c3c3cf92b83
SHA256: F6131485AF501832F7C1C367830130AEEEEC0CCFE20126302A0C76599BD4CD3E
File Size: 5.48 MB, 5476253 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments This installation was built with Inno Setup.
File Description
  • Drug Dealer Simulator 2 Setup
  • FOOTAGE REC Setup
  • Kvark Setup
  • Monster Jam Showdown Setup
File Version 1.00
Internal Name TJprojMain
Legal Copyright FitGirl
Original Filename TJprojMain.exe
Product Name
  • Drug Dealer Simulator 2
  • FOOTAGE REC
  • Kvark
  • Monster Jam Showdown
  • Project1
Product Version 1.00

File Traits

  • dll
  • ntdll
  • x86

Files Modified

File Attributes
c:\users\user\appdata\local\temp\is-14dm8.tmp\36f37a7fc1dfd9f92240302d9b0f8a6af521ad47_0005678236.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-brdpu.tmp\0d5575069aa91463ba7d68a17708e6cbba5dd231_0005678030.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-ensj7.tmp\_isetup\_setup64.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-ensj7.tmp\_isetup\_shfoldr.dll Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-ensj7.tmp\idp.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-ensj7.tmp\innocallback.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-ensj7.tmp\isdone.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-f9e2b.tmp\_isetup\_setup64.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-f9e2b.tmp\_isetup\_shfoldr.dll Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-f9e2b.tmp\idp.dll Generic Write,Read Attributes
Show More
c:\users\user\appdata\local\temp\is-f9e2b.tmp\innocallback.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-f9e2b.tmp\isdone.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-im92f.tmp\40952f2868e7771c9945a97022a5728754e9e477_0005958027.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-njvhg.tmp\1350893b90506b387db3b5674a20dd31e53dfb8a_0004748603.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-o4l4a.tmp\_isetup\_setup64.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-o4l4a.tmp\_isetup\_shfoldr.dll Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-o4l4a.tmp\idp.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-o4l4a.tmp\innocallback.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-o4l4a.tmp\isdone.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-onksh.tmp\_isetup\_setup64.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-onksh.tmp\_isetup\_shfoldr.dll Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-onksh.tmp\idp.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-onksh.tmp\innocallback.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-onksh.tmp\isdone.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-qervo.tmp\_isetup\_setup64.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-qervo.tmp\_isetup\_shfoldr.dll Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-qervo.tmp\idp.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-qervo.tmp\innocallback.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-qervo.tmp\isdone.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-tk54s.tmp\4543389340df1ff3c216fe641b77d8a82cea726f_0004718538.tmp Generic Write,Read Attributes

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
User Data Access
  • GetUserObjectInformation
Other Suspicious
  • SetWindowsHookEx

Shell Command Execution

"C:\Users\Omsqyoqq\AppData\Local\Temp\is-BRDPU.tmp\0d5575069aa91463ba7d68a17708e6cbba5dd231_0005678030.tmp" /SL5="$40062,5105057,140800,c:\users\user\downloads\0d5575069aa91463ba7d68a17708e6cbba5dd231_0005678030"
"C:\Users\Nriuaxzq\AppData\Local\Temp\is-TK54S.tmp\4543389340df1ff3c216fe641b77d8a82cea726f_0004718538.tmp" /SL5="$50054,4130382,140800,c:\users\user\downloads\4543389340df1ff3c216fe641b77d8a82cea726f_0004718538"
"C:\Users\Fgrvbwni\AppData\Local\Temp\is-IM92F.tmp\40952f2868e7771c9945a97022a5728754e9e477_0005958027.tmp" /SL5="$10280,5356402,140800,c:\users\user\downloads\40952f2868e7771c9945a97022a5728754e9e477_0005958027"
"C:\Users\Eqkfswiv\AppData\Local\Temp\is-14DM8.tmp\36f37a7fc1dfd9f92240302d9b0f8a6af521ad47_0005678236.tmp" /SL5="$1023E,5105107,140800,c:\users\user\downloads\36f37a7fc1dfd9f92240302d9b0f8a6af521ad47_0005678236"
"C:\Users\Muqdafky\AppData\Local\Temp\is-NJVHG.tmp\1350893b90506b387db3b5674a20dd31e53dfb8a_0004748603.tmp" /SL5="$300B6,4134331,140800,c:\users\user\downloads\1350893b90506b387db3b5674a20dd31e53dfb8a_0004748603"

Related Posts

Trending

Most Viewed

Loading...