Threat Database Trojans Trojan.RemoteAdmin.A

Trojan.RemoteAdmin.A

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 3,362
Threat Level: 80 % (High)
Infected Computers: 22,584
First Seen: December 12, 2012
Last Seen: March 9, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.RemoteAdmin.A
Signature status: No Signature

Known Samples

MD5: 84fb34e529bede393a3f604eaa8137b2
SHA1: 195ea03b7bd086454a13c0d8357e0a9e447d9ec9
File Size: 7.75 MB, 7752272 bytes
MD5: 3c5b22557bfa3587762311289c8c2fd1
SHA1: 9e8a2d86dcfe80501bb0e20b8aef479a5d7577bd
File Size: 2.16 MB, 2158080 bytes
MD5: 860486e5e0fb106b2a072be94758e038
SHA1: 14055fa4056d7af93fe50f7a453a2f243bf097c8
SHA256: CC6F629470DE28EA3619C8D41D636CAB044B56F534AFFF5EAA64D324953B8F1B
File Size: 6.18 MB, 6183680 bytes
MD5: a43ced1d40bdcdee1bc5b1ae7dbe7152
SHA1: 71aa0496879198092d5ed8aebafc3a433ba2bb87
SHA256: 26F8052F54DDF1A398B3D3C7D0457021001F17DFEBBA833DA25047033DA68BA9
File Size: 5.54 MB, 5537024 bytes
MD5: 92a30230482f08ece9f1b27f6128c085
SHA1: 3e9962f759a9e8dac46d1178bb9586262812b2a3
SHA256: 4B6775349D5C3C6044EA3DB9C04D89F3D255C83EB583769458B3FB864DCBD686
File Size: 5.06 MB, 5062570 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has exports table
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
Show More
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name
  • Aledensoft
  • TektonIT
File Description
  • LMNoIpServer
  • RMS Component
  • ROMFUSClient
  • ROMServer
File Version
  • 5.1
  • 5.0.0.0
  • 4.0.0.0
Legal Copyright
  • Copyright © 2004-2009 Aledensoft. All rights reserved.
  • Copyright © 2011 TektonIT. All rights reserved.
Original Filename RMS Module
Product Name
  • LMNoIpServer
  • Remote Office Manager
  • RMS
  • ROMFUSClient
  • ROMServer
Product Version
  • 5.1
  • 5.0.0.0
  • 4.0
Program I D
  • com.embarcadero.LMNoIpServer
  • com.embarcadero.ROMFUSClient
  • com.embarcadero.ROMServer

Digital Signatures

Signer Root Status
Yakhnovets Denis Aleksandrovich IP Yakhnovets Denis Aleksandrovich IP Hash Mismatch
Yakhnovets Denis Aleksandrovich IP Yakhnovets Denis Aleksandrovich IP Self Signed

File Traits

  • 2+ executable sections
  • VirtualQueryEx
  • x86

Block Information

Similar Families

  • Agent.XVC
  • Banker.AN
  • Casbaneiro.A
  • Lumma.XC
  • Penguish.EA

Files Modified

File Attributes
c:\users\user\appdata\local\temp\7zipsfx.000\install.cmd Generic Write,Read Attributes
c:\users\user\appdata\local\temp\7zipsfx.000\install.cmd Synchronize,Write Attributes
c:\users\user\appdata\local\temp\7zipsfx.000\rms.server5.2rc1ru.msi Generic Write,Read Attributes
c:\users\user\appdata\local\temp\7zipsfx.000\rms.server5.2rc1ru.msi Synchronize,Write Attributes
c:\users\user\downloads\logs\2025_07_rom_log.txt Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\downloads\logs\2025_07_rom_log.txt Generic Write,Read Attributes

Registry Modifications

Key::Value Data API Name
HKLM\software\wow6432node\aledensoft\remote office manager\v3.4\config::serverexe c:\users\user\downloads\9e8a2d86dcfe80501bb0e20b8aef479a5d7577bd_0002158080.exe RegNtPreCreateKey
HKLM\system\remote office manager\v3.4\server\parameters::fusclientpath c:\users\user\downloads\ROMFUSClient.exe RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\explorer::slowcontextmenuentries RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\content::cacheprefix RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\cookies::cacheprefix Cookie: RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\history::cacheprefix Visited: RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass  RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname  RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet  RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect RegNtPreCreateKey
Show More
HKCU\software\microsoft\edge\blbeacon::failed_count RegNtPreCreateKey
HKCU\software\microsoft\edge\blbeacon::state  RegNtPreCreateKey
HKCU\software\microsoft\edge\thirdparty::statuscodes (NULL) RegNtPreCreateKey
HKCU\software\microsoft\edge\thirdparty::statuscodes  RegNtPreCreateKey
HKCU\software\microsoft\edge\elfbeacon::version 143.0.3650.96 RegNtPreCreateKey
HKCU\software\microsoft\edge\blbeacon::failed_count  RegNtPreCreateKey
HKCU\software\microsoft\edge\blbeacon::state  RegNtPreCreateKey
HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe 뉇롚껁ǜ RegNtPreCreateKey

Windows API Usage

Category API
User Data Access
  • GetComputerName
  • GetUserObjectInformation
Service Control
  • OpenSCManager
  • OpenService
Network Winsock2
  • WSAStartup
Network Winsock
  • bind
  • getsockname
  • setsockopt
  • socket
Other Suspicious
  • AdjustTokenPrivileges
Process Shell Execute
  • CreateProcess
  • ShellExecuteEx
Process Manipulation Evasion
  • NtUnmapViewOfSection
  • ReadProcessMemory
Syscall Use
  • ntdll.dll!NtAccessCheck
  • ntdll.dll!NtAlertThreadByThreadId
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtAssociateWaitCompletionPacket
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateEvent
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateMutant
  • ntdll.dll!NtCreateSection
Show More
  • ntdll.dll!NtCreateSemaphore
  • ntdll.dll!NtDeleteValueKey
  • ntdll.dll!NtDuplicateObject
  • ntdll.dll!NtDuplicateToken
  • ntdll.dll!NtEnumerateValueKey
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenProcessTokenEx
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenThreadTokenEx
  • ntdll.dll!NtPowerInformation
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryLicenseValue
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQuerySecurityObject
  • ntdll.dll!NtQuerySystemInformation
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadRequestData
  • ntdll.dll!NtReleaseMutant
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtSetValueKey
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWriteFile
  • UNKNOWN

Shell Command Execution

c:\users\user\downloads\ROMFUSClient.exe /tray
(NULL) http://rmansys.ru/
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --edge-skip-compat-layer-relaunch --single-argument http://rmansys.ru/
(NULL) install.cmd

Trending

Most Viewed

Loading...