Threat Database Trojans Trojan.ReverseShell.TB

Trojan.ReverseShell.TB

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 20,709
Threat Level: 80 % (High)
Infected Computers: 4
First Seen: October 9, 2025
Last Seen: May 17, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.ReverseShell.TB
Signature status: Self Signed

Known Samples

MD5: 026a597d8897f9987a5a88dd6c5cc2d6
SHA1: cea0639072bb2259abe9fc5783335317e45e395a
SHA256: CBEBA1C515288181049EA0299AA7D6B5757BB12E169A5B244722B7E6DC2960D8
File Size: 136.40 KB, 136403 bytes
MD5: c8c32448c8d39411e577909cffa5ea41
SHA1: 09c694844675588dc17b76651615a1985eac811c
SHA256: 1F0D7D365171D55E7C5EF6B61A92D5F01978C40E9707B8BF5E1C92FBA0E72AF4
File Size: 136.40 KB, 136403 bytes
MD5: 9ff837f7bdad187e6c4781f62e1ff900
SHA1: 8e4d9d97ab2f3c71ce57034aa28671f56dd7e31e
SHA256: F3FB5787E8356C77EE6DD17B6CDF795B68C304C01FF70D53A454526D41466624
File Size: 50.15 KB, 50152 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have resources
  • File doesn't have security information
  • File has TLS information
  • File is 64-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
Show More
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Comments Virtual Eye On Networks (https://veyon.io)
Company Name Veyon Solutions
File Description Veyon Worker
File Version 4.10.2
Legal Copyright Copyright (c) 2017-2026 Veyon Solutions / Tobias Junghans
Original Filename veyon-worker.exe
Product Name Veyon
Product Version 4.10.2

Digital Signatures

Signer Root Status
Tobias Junghans Tobias Junghans Self Signed

File Traits

  • No Version Info
  • x64

Block Information

Total Blocks: 196
Potentially Malicious Blocks: 1
Whitelisted Blocks: 164
Unknown Blocks: 31

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 ? 0 0 0 0 0 ? 0 ? 0 0 0 0 0 0 0 ? ? 0 0 ? ? 0 0 ? 0 0 0 0 0 ? 0 0 ? ? ? 0 0 0 ? 0 0 ? ? 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 ? x 0 ? 0 ? ? ? 0 ? ? 0 ? ? ? 0 0 0 0 ? 0 ? 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Injector.SR
  • Kryptik.DCD
  • Rozena.XV
  • Trojan.ShellcodeRunner.Gen.OW

Files Modified

File Attributes
\device\namedpipe Generic Read,Write Attributes
\device\namedpipe Generic Write,Read Attributes

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtClose
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTerminateProcess
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtWriteFile
  • UNKNOWN
Process Shell Execute
  • CreateProcess

Shell Command Execution

openscad.exe

Trending

Most Viewed

Loading...