Threat Database Trojans Trojan.Nimda.D

Trojan.Nimda.D

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 14,542
Threat Level: 80 % (High)
Infected Computers: 306
First Seen: September 24, 2021
Last Seen: December 4, 2025
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.Nimda.D
Signature status: No Signature

Known Samples

MD5: 6f725d6ce8d41d1f84adfda61615dc02
SHA1: e3eef0dbaff577c7df5eb7c0be1fc4ebe8720d0d
SHA256: B377052D1DB087503707D870B745ED5C87014EDE72E2A6A38B2724C295894B63
File Size: 162.42 KB, 162422 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

File Traits

  • big overlay
  • No Version Info
  • x86

Block Information

Total Blocks: 29
Potentially Malicious Blocks: 8
Whitelisted Blocks: 21
Unknown Blocks: 0

Visual Map

0 0 0 0 x 0 x x 0 0 x 0 0 0 0 0 0 0 0 x 0 x x 0 0 0 0 0 x
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Nimda.C
  • Nimda.D

Files Modified

File Attributes
c:\users\user\appdata\local\temp\amx20e7.mid Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\tmp1ffe.exe Generic Write,Read Attributes

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess

Shell Command Execution

C:\Users\Yrfrdvdi\AppData\Local\Temp\TMP1FFE.exe

Trending

Most Viewed

Loading...