Threat Database Trojans Trojan.Makoob.A

Trojan.Makoob.A

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 9,955
Threat Level: 80 % (High)
Infected Computers: 79
First Seen: August 28, 2024
Last Seen: December 26, 2025
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.Makoob.A
Signature status: No Signature

Known Samples

MD5: 8274b0535d4f41e84004ff3c2b732d30
SHA1: 579711210f8c4a6bb94a856040a3c96012dbb609
SHA256: BC527B895E068ADB213DC69A2A2431CB54A0EE2317A2975570A697490FED72F4
File Size: 206.61 KB, 206606 bytes
MD5: 05ebc0dd2487eff1d56c87a1737be66a
SHA1: 3de4a6c9c2384734e3e586ce101f31ba0265fef4
SHA256: 3BA2AAD1CF3CEADDB9969C389BC7062E6FAEA3B654870AEC719550CF085C5AE7
File Size: 8.35 MB, 8353664 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name Softplicity Inc.
File Description Total Audio Converter v5.2.73
File Version 5.2.0.73
Legal Copyright © Softplicity Inc.
Product Name Total Audio Converter v5.2.73

File Traits

  • Installer Manifest
  • nosig nsis
  • No Version Info
  • Nullsoft Installer
  • x86

Block Information

Similar Families

  • Brute.BH
  • Chapak.HBBB
  • Chapak.HBW
  • Makoob.A
  • Rozena.H

Files Modified

File Attributes
\device\namedpipe\gmdasllogger Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsc68c2.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete
c:\users\user\appdata\local\temp\nsd69ad.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete
c:\users\user\appdata\local\temp\nsia98a.tmp\langdll.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\~nsu.tmp\au_.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144

Registry Modifications

Key::Value Data API Name
HKLM\system\controlset001\control\session manager::pendingfilerenameoperations \??\C:\Users\Vfoweeky\AppData\Local\Temp\~nsu.tmp\Au_.exe RegNtPreCreateKey
HKLM\system\controlset001\control\session manager::pendingfilerenameoperations \??\C:\Users\Vfoweeky\AppData\Local\Temp\~nsu.tmp\Au_.exe\??\C:\Users\Vfoweeky\AppData\Local\Temp\~nsu.tmp RegNtPreCreateKey

Windows API Usage

Category API
Process Shell Execute
  • CreateProcess
Process Manipulation Evasion
  • ReadProcessMemory
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation

Shell Command Execution

"C:\Users\Vfoweeky\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=c:\users\user\downloads\

Trending

Most Viewed

Loading...