Threat Database Trojans Trojan.Jorik.Androm.pqr

Trojan.Jorik.Androm.pqr

By Domesticus in Trojans

Threat Scorecard

Threat Level: 90 % (High)
Infected Computers: 5
First Seen: May 17, 2013
Last Seen: March 19, 2026
OS(es) Affected: Windows

Trojan.Jorik.Androm.pqr is a Trojan that is distributed via spam emails, which carry falsified invoices from Zalando and Deutsche Bahn. The fake email dupes attacked computer users into running a malevolent file, found as Trojan.Jorik.Androm.pqr. Cybercriminals send personalized email messages in the German language supposedly coming from the well-known website Zalando.de (shoes and women accessories) and from the Deutsche Bahn (German Railways). The text is addressed to the target recipient directly, and it threatens the victimized PC user so that he/she opens the ZIP archive and runs the harmful file. If the affected PC user opens and executes the damaging file, his/her PC will get contaminated with

Trojan.Jorik.Androm.pqr.

File System Details

Trojan.Jorik.Androm.pqr may create the following file(s):
# File Name Detections
1. btc[1].exe
2. adobe_restart[1].exe
3. www2d.gif
4. image19.jpg.pif
5. 296291521.gif
6. yif81909.png

Registry Details

Trojan.Jorik.Androm.pqr may create the following registry entry or registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run mService = [file name and location of the trojan]
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run WINSXS32 = [file name and location of the trojan]

Analysis Report

General information

Family Name: Trojan.PoisonIvy.H
Signature status: No Signature

Known Samples

MD5: e043454a8a8fa2b470b011ab84728407
SHA1: 7bd3315321042ed5bff9d347ef5ba6398a6a690f
SHA256: 44695641647051057BBE91BDFBA74C13D029EBD8E16BFECA8DCBC1A35F944536
File Size: 10.24 KB, 10240 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have resources
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Traits

  • No Version Info
  • x86

Block Information

Total Blocks: 45
Potentially Malicious Blocks: 43
Whitelisted Blocks: 2
Unknown Blocks: 0

Visual Map

0 x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Packed With PeNinja
  • PoisonIvy.A
  • PoisonIvy.AA
  • PoisonIvy.AC
  • PoisonIvy.F

Trending

Most Viewed

Loading...