Threat Database Trojans Trojan.Script.12023

Trojan.Script.12023

By Sumo3000 in Trojans

Threat Scorecard

Popularity Rank: 12,281
Threat Level: 90 % (High)
Infected Computers: 64
First Seen: September 14, 2012
Last Seen: January 22, 2026
OS(es) Affected: Windows

Trojan.Script.12023 is a Trojan which can proliferate through malicious websites, spam email messages, unsafe downloads and lots of other means used by web attackers. Trojan.Script.12023 can infiltrate into the compromised PC secretly without the affected computer owner's consent and knowledge. Trojan.Script.12023 can download and install more malware infections on the infected computer system. Trojan.Script.12023 may inject a malicious code into hijacked websites. Trojan.Script.12023 may generate and display disturbing pop-up advertisements.
Trojan.Script.12023 can cause serious security and privacy problems.

Analysis Report

General information

Family Name: Trojan.Banload.L
Packers: UPX!
Signature status: No Signature

Known Samples

MD5: 4cb4aaf20ff9ae14ec02bac797addcfd
SHA1: 5d4658bad47168ffed62014b1adbc2571c654789
File Size: 9.26 MB, 9255936 bytes
MD5: e85e18183d8724fa19cdc3ac659c15d1
SHA1: 51026fadf861d088ea6a56a2bcbbbee68bae375b
File Size: 4.40 MB, 4396032 bytes
MD5: b7f95c70f88776297bf4b2ee72be3e7c
SHA1: a5e6f513e6d54cb41f724a39526d8d09380ebdb1
SHA256: 55DF2968F8470FDA8459EE35BF0DD3AF21BE9C96CC70CA9A8BA13BB3A08910E5
File Size: 1.08 MB, 1078784 bytes
MD5: 373b84468dba65d61c8ac5be7ab3cbd5
SHA1: 76f015406aed86b6ed016e7f1e99fd3858a87a2e
SHA256: EB92E369CA3B3F4EB14AB5399A311CC0CC9B166BA2015AEADC279AF75FB0589D
File Size: 5.20 MB, 5195444 bytes
MD5: cf92711839ec1698fdff6cc7e2b91059
SHA1: 8a685d0fd0bf5756cf9d6030401e58a9f2bd1485
SHA256: C61615D2C41E0E8952435568A02C6BC8BF340525BC8F753929D0F11340557D9F
File Size: 2.70 MB, 2698752 bytes
Show More
MD5: 5e37272f552f28b3e028703d517f2730
SHA1: 1f7c93a1891959ace5a231674ad1a41a04573717
SHA256: 0C561B59C752800394FC952939FABDF013804106F9425A2359CFF79AFFC64E18
File Size: 2.48 MB, 2482688 bytes
MD5: 492ec413cad4735f6236085bad3634dc
SHA1: deddbd6c93cd7d0daa798bd0cf97146cd87162eb
SHA256: 8D70945D6501504FB160018869D93BEE4838203803614A6F6894A2078DE2A28C
File Size: 1.44 MB, 1443840 bytes
MD5: 443bfe379030e7fb18d002452ead0467
SHA1: 140444c710e5fd2b04fa011b5b77226c117eefda
SHA256: AD26B8785A56F7530C10BBE625A9DB89473612FD19E9E16A08D8718752F84F33
File Size: 3.72 MB, 3721728 bytes
MD5: 7b4e5c392524409cf102cd6c27711ea2
SHA1: 175774145a6d6d5b1ab4e651940f763619d58161
SHA256: CACB8E7C2AF861EB7DB4B49F1CACB15224209E27D5078123250CD10840FA3F55
File Size: 7.26 MB, 7262720 bytes
MD5: 685098ab5615b2f63d146ff6ee4502c5
SHA1: 68fb6d7080e5ff644da6ba8cdb059af8d210dd97
SHA256: 575C258EC3CC16684D2AD2153BA128667EB1E22380302469F85BB1A57A0D69B2
File Size: 1.32 MB, 1323520 bytes
MD5: eb0263bbf07db9db0eeaf33d3a24ce59
SHA1: c8ee7d570d023593232391d802bf577ae5734b55
SHA256: 7688D6A5A99DBD5F4302F165C28DC98B703395A478FFCAF5D9B74AFCB6E47A37
File Size: 5.36 MB, 5359616 bytes
MD5: 5eef737e191bd2fcb30aa838525e1452
SHA1: fa342efb8e11be779ffa914e1486d62572ff0b60
SHA256: 7B10D8684140DE660533E32ABB2E6B674D2B55D8BFFD2D9EC2636DF5D0B3BEA6
File Size: 4.14 MB, 4143616 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has been packed
  • File has exports table
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
Show More
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Show More

Windows PE Version Information

Name Value
Comments
  • Soluções Inteligentes
  • suporte@nexo.com.br | www.nexo.com.br
  • This installation was built with Inno Setup.
Company Name
  • Bitshop Informática Ltda
  • NEXO interativa e Sucesso Informática
  • PrimeSoftware - Sistema e Análise Ltda.
  • SISTEMA ATHOS
Compile Date quinta-feira, 25 de abril de 2024 11:13
File Description
  • Autorizador Farmácia Popular 2.0.1 - HOMOLOGAÇÃO Setup
  • Módulo de Emissão Nota Fiscal Eletrônica
  • SisPS ATU - Soluções Inteligentes
File Version
  • 2024.10.805.101
  • 17.10.25.0
  • 3.0.83.8
  • 3.0.64.3
  • 1.0.0.203
Internal Name
  • NexoNFe
  • PS04.exe
Legal Copyright
  • Copyright © 1995 - 2024 NEXO interativa
  • ©2022 Sistema Athos
Legal Trademarks
  • Nexo Tecnologia Interativa e Processamento de Dados Ltda.
  • ©2022 Sistema Athos
Original Filename
  • NexoNFe.exe
  • PS04.exe
Product Name
  • ATHOS
  • Autorizador Farmácia Popular 2.0.1 - HOMOLOGAÇÃO
  • NexoNFe
  • SisPS
Product Version
  • ATU
  • 3.0.83.8
  • 3.0.64.3
  • 2.10.2024.01
  • 1.0.0.0

File Traits

  • 2+ executable sections
  • dll
  • HighEntropy
  • No Version Info
  • packed
  • VirtualQueryEx
  • WriteProcessMemory
  • x86

Block Information

Total Blocks: 30,678
Potentially Malicious Blocks: 106
Whitelisted Blocks: 25,650
Unknown Blocks: 4,922

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • FakeAlert.E

Files Modified

File Attributes
c:\users\user\appdata\local\temp\is-id0r5.tmp\76f015406aed86b6ed016e7f1e99fd3858a87a2e_0005195444.tmp Generic Write,Read Attributes
c:\users\user\downloads\rdusers.rda Generic Read,Write Data,Write Attributes,Write extended,Append data

Windows API Usage

Category API
Anti Debug
  • IsDebuggerPresent
  • NtQuerySystemInformation
User Data Access
  • GetUserObjectInformation
Other Suspicious
  • SetWindowsHookEx
Network Winsock2
  • WSAStartup
Keyboard Access
  • GetKeyboardState
  • GetKeyState
  • SetKeyboardState
Network Winhttp
  • WinHttpOpen
Syscall Use
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtProtectVirtualMemory
Show More
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWriteFile
  • ntdll.dll!NtWriteVirtualMemory
  • win32u.dll!NtUserGetKeyboardLayout
  • win32u.dll!NtUserGetThreadState
Process Shell Execute
  • CreateProcess
Process Manipulation Evasion
  • NtUnmapViewOfSection
Network Urlomon
  • URLDownloadToFile

Shell Command Execution

C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\a5e6f513e6d54cb41f724a39526d8d09380ebdb1_0001078784.,LiQMAxHB
"C:\Users\Ehbeexab\AppData\Local\Temp\is-ID0R5.tmp\76f015406aed86b6ed016e7f1e99fd3858a87a2e_0005195444.tmp" /SL5="$6005A,4942388,56832,c:\users\user\downloads\76f015406aed86b6ed016e7f1e99fd3858a87a2e_0005195444"
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\140444c710e5fd2b04fa011b5b77226c117eefda_0003721728.,LiQMAxHB

Trending

Most Viewed

Loading...