Trojan.Script.12023
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 12,281 |
| Threat Level: | 90 % (High) |
| Infected Computers: | 64 |
| First Seen: | September 14, 2012 |
| Last Seen: | January 22, 2026 |
| OS(es) Affected: | Windows |
Trojan.Script.12023 is a Trojan which can proliferate through malicious websites, spam email messages, unsafe downloads and lots of other means used by web attackers. Trojan.Script.12023 can infiltrate into the compromised PC secretly without the affected computer owner's consent and knowledge. Trojan.Script.12023 can download and install more malware infections on the infected computer system. Trojan.Script.12023 may inject a malicious code into hijacked websites. Trojan.Script.12023 may generate and display disturbing pop-up advertisements.
Trojan.Script.12023 can cause serious security and privacy problems.
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.Banload.L |
|---|---|
| Packers: | UPX! |
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
4cb4aaf20ff9ae14ec02bac797addcfd
SHA1:
5d4658bad47168ffed62014b1adbc2571c654789
File Size:
9.26 MB, 9255936 bytes
|
|
MD5:
e85e18183d8724fa19cdc3ac659c15d1
SHA1:
51026fadf861d088ea6a56a2bcbbbee68bae375b
File Size:
4.40 MB, 4396032 bytes
|
|
MD5:
b7f95c70f88776297bf4b2ee72be3e7c
SHA1:
a5e6f513e6d54cb41f724a39526d8d09380ebdb1
SHA256:
55DF2968F8470FDA8459EE35BF0DD3AF21BE9C96CC70CA9A8BA13BB3A08910E5
File Size:
1.08 MB, 1078784 bytes
|
|
MD5:
373b84468dba65d61c8ac5be7ab3cbd5
SHA1:
76f015406aed86b6ed016e7f1e99fd3858a87a2e
SHA256:
EB92E369CA3B3F4EB14AB5399A311CC0CC9B166BA2015AEADC279AF75FB0589D
File Size:
5.20 MB, 5195444 bytes
|
|
MD5:
cf92711839ec1698fdff6cc7e2b91059
SHA1:
8a685d0fd0bf5756cf9d6030401e58a9f2bd1485
SHA256:
C61615D2C41E0E8952435568A02C6BC8BF340525BC8F753929D0F11340557D9F
File Size:
2.70 MB, 2698752 bytes
|
Show More
|
MD5:
5e37272f552f28b3e028703d517f2730
SHA1:
1f7c93a1891959ace5a231674ad1a41a04573717
SHA256:
0C561B59C752800394FC952939FABDF013804106F9425A2359CFF79AFFC64E18
File Size:
2.48 MB, 2482688 bytes
|
|
MD5:
492ec413cad4735f6236085bad3634dc
SHA1:
deddbd6c93cd7d0daa798bd0cf97146cd87162eb
SHA256:
8D70945D6501504FB160018869D93BEE4838203803614A6F6894A2078DE2A28C
File Size:
1.44 MB, 1443840 bytes
|
|
MD5:
443bfe379030e7fb18d002452ead0467
SHA1:
140444c710e5fd2b04fa011b5b77226c117eefda
SHA256:
AD26B8785A56F7530C10BBE625A9DB89473612FD19E9E16A08D8718752F84F33
File Size:
3.72 MB, 3721728 bytes
|
|
MD5:
7b4e5c392524409cf102cd6c27711ea2
SHA1:
175774145a6d6d5b1ab4e651940f763619d58161
SHA256:
CACB8E7C2AF861EB7DB4B49F1CACB15224209E27D5078123250CD10840FA3F55
File Size:
7.26 MB, 7262720 bytes
|
|
MD5:
685098ab5615b2f63d146ff6ee4502c5
SHA1:
68fb6d7080e5ff644da6ba8cdb059af8d210dd97
SHA256:
575C258EC3CC16684D2AD2153BA128667EB1E22380302469F85BB1A57A0D69B2
File Size:
1.32 MB, 1323520 bytes
|
|
MD5:
eb0263bbf07db9db0eeaf33d3a24ce59
SHA1:
c8ee7d570d023593232391d802bf577ae5734b55
SHA256:
7688D6A5A99DBD5F4302F165C28DC98B703395A478FFCAF5D9B74AFCB6E47A37
File Size:
5.36 MB, 5359616 bytes
|
|
MD5:
5eef737e191bd2fcb30aa838525e1452
SHA1:
fa342efb8e11be779ffa914e1486d62572ff0b60
SHA256:
7B10D8684140DE660533E32ABB2E6B674D2B55D8BFFD2D9EC2636DF5D0B3BEA6
File Size:
4.14 MB, 4143616 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File has been packed
- File has exports table
- File has TLS information
- File is 32-bit executable
- File is either console or GUI application
Show More
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Show More
Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Comments |
|
| Company Name |
|
| Compile Date | quinta-feira, 25 de abril de 2024 11:13 |
| File Description |
|
| File Version |
|
| Internal Name |
|
| Legal Copyright |
|
| Legal Trademarks |
|
| Original Filename |
|
| Product Name |
|
| Product Version |
|
File Traits
- 2+ executable sections
- dll
- HighEntropy
- No Version Info
- packed
- VirtualQueryEx
- WriteProcessMemory
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 30,678 |
|---|---|
| Potentially Malicious Blocks: | 106 |
| Whitelisted Blocks: | 25,650 |
| Unknown Blocks: | 4,922 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- FakeAlert.E
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| c:\users\user\appdata\local\temp\is-id0r5.tmp\76f015406aed86b6ed016e7f1e99fd3858a87a2e_0005195444.tmp | Generic Write,Read Attributes |
| c:\users\user\downloads\rdusers.rda | Generic Read,Write Data,Write Attributes,Write extended,Append data |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Anti Debug |
|
| User Data Access |
|
| Other Suspicious |
|
| Network Winsock2 |
|
| Keyboard Access |
|
| Network Winhttp |
|
| Syscall Use |
Show More
|
| Process Shell Execute |
|
| Process Manipulation Evasion |
|
| Network Urlomon |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\a5e6f513e6d54cb41f724a39526d8d09380ebdb1_0001078784.,LiQMAxHB
|
"C:\Users\Ehbeexab\AppData\Local\Temp\is-ID0R5.tmp\76f015406aed86b6ed016e7f1e99fd3858a87a2e_0005195444.tmp" /SL5="$6005A,4942388,56832,c:\users\user\downloads\76f015406aed86b6ed016e7f1e99fd3858a87a2e_0005195444"
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\140444c710e5fd2b04fa011b5b77226c117eefda_0003721728.,LiQMAxHB
|