Threat Database Trojans Trojan.Miner

Trojan.Miner

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 10,685
Threat Level: 80 % (High)
Infected Computers: 3,339
First Seen: December 6, 2012
Last Seen: November 17, 2025
OS(es) Affected: Windows

SpyHunter Detects & Remove Trojan.Miner

File System Details

Trojan.Miner may create the following file(s):
# File Name MD5 Detections
1. minerd.exe d561aac2da5525a498b54b531112154b 14

Analysis Report

General information

Family Name: Trojan.Miner
Signature status: No Signature

Known Samples

MD5: aa6e4d2ea2011b06121258431b0738e4
SHA1: a5de16895768d8e1602368c62925af0c5e63bc02
SHA256: 991763EADE8185471F733A2E989512B1668E967C2599814279DAC5F62783F418
File Size: 97.79 KB, 97792 bytes
MD5: 5fca329532fe3b535d19a497963fa0d0
SHA1: 06982a190b31df23bcdc2c211e591d1df6454cbd
SHA256: 1875BEAB8A00EB0C717674A617EF3745616DC1908EFF5C4C48BA765EE6EB9220
File Size: 110.59 KB, 110592 bytes
MD5: 5326f17129896b8959bd9a894a84b073
SHA1: 9db18881ee2683c59975ac244924b1e29aed590c
SHA256: 500C2409C287ABE88006021C5C9C25EB73E104F36BE14FC9260C4D5A594B2A28
File Size: 126.46 KB, 126464 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have security information
  • File has exports table
  • File is 32-bit executable
  • File is 64-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Company Name Razor
File Description Razor Loader Library
File Version 1.0.0.0
Internal Name Loader.dll
Legal Copyright Copyright (C) 2014
Original Filename Loader.dll
Product Name Razor Loader Library
Product Version 1.0.0.0

File Traits

  • 2+ executable sections
  • dll
  • JMC
  • No Version Info
  • WriteProcessMemory
  • x64
  • x86

Block Information

Total Blocks: 250
Potentially Malicious Blocks: 1
Whitelisted Blocks: 241
Unknown Blocks: 8

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 ? ? 0 0 0 0 0 0 x ? 0 ? 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Agent.XFM
  • Downloader.GS
  • Exploit.OD
  • HackKMS.LN
  • Injector.GFDC
Show More
  • Rugmi.FC
  • Shellcode.BX
  • ShellcodeRunner.LD
  • ShellcodeRunner.XK

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtProtectVirtualMemory
Show More
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWriteFile
  • ntdll.dll!NtWriteVirtualMemory
  • win32u.dll!NtUserGetKeyboardLayout
  • win32u.dll!NtUserGetThreadState
Process Shell Execute
  • CreateProcess
Anti Debug
  • NtQuerySystemInformation

Shell Command Execution

C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\a5de16895768d8e1602368c62925af0c5e63bc02_0000097792.,LiQMAxHB
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\06982a190b31df23bcdc2c211e591d1df6454cbd_0000110592.,LiQMAxHB

Trending

Most Viewed

Loading...