Trojan.Rugmi.BB
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 797 |
| Threat Level: | 80 % (High) |
| Infected Computers: | 2,350 |
| First Seen: | October 2, 2024 |
| Last Seen: | March 19, 2026 |
| OS(es) Affected: | Windows |
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.Rugmi.BB |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
fcc7330c0957138334f26b6d2f94e9e6
SHA1:
fff8031bd00ebcae704173ecae252380f110ebdf
SHA256:
A552F9FFBD46193F551E04B6190CAA11EB4873EEE957B540237205DEBC28FE76
File Size:
6.18 MB, 6182008 bytes
|
|
MD5:
eaecb4944745479e5fb7cc1e0ece8294
SHA1:
fe4952806382f4823664a786cf109a07a721a27b
SHA256:
2C5D8D029D3C35FABCC6CB60E5001087B638D517B483D3943090869B60BF001A
File Size:
6.18 MB, 6183424 bytes
|
|
MD5:
02b16af30cfd90774ab44a9f112e4bb6
SHA1:
ff5a3d43b49a98dc4512387a6e09c3a7ea220864
SHA256:
596CFB93DDF7331A382B41A0519792FAE311739521011A52BBFBA864A4A8EAEE
File Size:
5.83 MB, 5825144 bytes
|
|
MD5:
9a1317065e715ac97362472657bbbd24
SHA1:
17d5cbbbc322209fdba3d09d872ca61b5659e3d4
SHA256:
830D0BFAB0F6B5B8959B07443AF229A32432A4B9DF823DFC43ECE0659C8E5B3E
File Size:
5.86 MB, 5864448 bytes
|
|
MD5:
aee6252d4dc3f35da61a755580137044
SHA1:
758d12e19fb0fb158fa05b2bebb579ceb339d62e
SHA256:
D2F462D0EE1561DA8CCE7B6CFF43F35CCA51684B15BFEBF338AA3837F8D42F22
File Size:
6.13 MB, 6133880 bytes
|
Show More
|
MD5:
21bf5c5f60004eff99cff8c481e086db
SHA1:
937dce8e30cd0344a21174357fad307becebef7e
SHA256:
F668FBE017ABE45F6E4ECA98852FE705A1874E15474CBD01FADD7212010CB8A6
File Size:
5.86 MB, 5861376 bytes
|
|
MD5:
5e703e46bc4d7b68b0850a5e10bcef25
SHA1:
06e160600b0c7046bf5d5d4393cbbe04f93351a0
SHA256:
BE3BEE70A01AB575D9D23FEEA7D8C0D2652E45A9879A108AF13405E6D16E84CC
File Size:
6.15 MB, 6149808 bytes
|
|
MD5:
a2bb1d04cd66d505d44424cd02ccceca
SHA1:
2664e576605707f4d2be551aa46f8ab357d72d43
SHA256:
60299C97C3BF8F0904A348C84A5D5B1B30223593D21BC6452B2F66A84FDAD098
File Size:
5.82 MB, 5819392 bytes
|
|
MD5:
ee4e748f40d6808b34bb0361879d5d04
SHA1:
2bbf00a6057b2d4e9dfb3a30984d4b4311d3dfa6
SHA256:
C3C451FA65B2A9D0863A02708BB3187630EFF2F42D47B2455F2B53A621EA8BC7
File Size:
5.79 MB, 5790208 bytes
|
|
MD5:
8d60d306a5bfd28f10ef922821900b5e
SHA1:
af4f82911344951a7fa996e2b3cd98dc927b93a0
SHA256:
C950B1CCDCBC1003907D1756DEF88AC886DAD26F03A3588CFD0A9DA8B2447D6A
File Size:
5.79 MB, 5790208 bytes
|
|
MD5:
8178a1ca188d04f381e0771421dc8328
SHA1:
d9b4bafaedf3b3df3cde559d6050de17b7cdce5c
SHA256:
E90D7639A52D10F6B51A752A3A9FC709F838C4C86F0BC313DCC9B1BDDE30BD08
File Size:
5.79 MB, 5790208 bytes
|
|
MD5:
dd60e1c0e1a8ddc11c4f4c003225713f
SHA1:
31854843867af6e8b0e10fe95ff0c815115012af
SHA256:
F9FE8E2ACCB5A7088D473376FC05BE8F8BCD853FFC8A45457F0DCF7D947CEF79
File Size:
5.79 MB, 5790208 bytes
|
|
MD5:
d292d66905f618b840296da4c65a1e22
SHA1:
a262f05eb1ccd567d32dc372a3f0e8c45875ca3d
SHA256:
32DC80FF7B1CF56D292FCA04D9F416341BFF94EAF531D4CB5A1457D3BA0063D4
File Size:
5.79 MB, 5790208 bytes
|
|
MD5:
3c0b40c2e7d18c535042402295ba8c40
SHA1:
1d05f5bac7a928f8edf8a981b62234935404fc58
SHA256:
531137C78152E3EFA4A98C2BB59A97B365CD973784DBBBDA253090D8CB758B43
File Size:
6.13 MB, 6133880 bytes
|
|
MD5:
75fd08ee66fcdff816d5b8d704cb695d
SHA1:
df9c5c400a9e9d248b94fb632b4a2f377faea5b2
SHA256:
DE656D2F9F78D64DEC8ADE6F6E0F796701B5193F699211A70B8D3A14F9455419
File Size:
5.79 MB, 5790208 bytes
|
|
MD5:
f7ff90db67b8b1491a3b1f7d74c82f1c
SHA1:
bd70a4677abf6e2ef984239a31b31ca967b04f64
SHA256:
96E073314B4604192497CDB74A833D84D980DCD3658F8FF767B49727045D9E3C
File Size:
5.79 MB, 5790208 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have security information
- File has exports table
- File has TLS information
- File is 64-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Company Name | The Qt Company Ltd. |
| File Description | C++ Application Development Framework |
| File Version |
|
| Legal Copyright |
|
| Original Filename |
|
| Product Name | Qt5 |
| Product Version |
|
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| The Qt Company Oy | Entrust Root Certification Authority - G2 | Hash Mismatch |
| The Qt Company Oy | thawte SHA256 Code Signing CA | Hash Mismatch |
File Traits
- dll
- x64
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 15,159 |
|---|---|
| Potentially Malicious Blocks: | 151 |
| Whitelisted Blocks: | 14,990 |
| Unknown Blocks: | 18 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Rugmi.BB
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
8 additional items are not displayed above. |