Trojan.Sdum.A
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 11,186 |
| Threat Level: | 80 % (High) |
| Infected Computers: | 96 |
| First Seen: | October 19, 2024 |
| Last Seen: | February 16, 2026 |
| OS(es) Affected: | Windows |
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.Sdum.A |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
9bc0424ffd07f5ae0905e49b1b640caf
SHA1:
854d0a028ac029b90580245e93f61b6b8bc9fdb5
SHA256:
A49E9CEE08964B7FE562079CF790D62AA8F0A78E57E672E6C58FD3248CC73477
File Size:
208.38 KB, 208384 bytes
|
|
MD5:
38ac56927acc81bcd95289a96a89a522
SHA1:
99b26f5e5ea206f11c1670c8ef14deef73d1cfa8
SHA256:
677782E0750DEFF17AFE2CF56EC4EAC1182833143C1FE3E8CEB705502FB7CB5A
File Size:
208.38 KB, 208384 bytes
|
|
MD5:
8298ef22104e607ef7c4e0c6dfa253a1
SHA1:
d6a59cd0b5646e804aa8cf2699b429a71fc56f2e
SHA256:
B132A54A16AF49BACE197F751235943EF6E03BE6CAD82DA0C95CE8EF0C0E57B4
File Size:
208.38 KB, 208384 bytes
|
|
MD5:
7b74b027f0716bc18ae421e52664d1b9
SHA1:
c2be2df17cc63fb74ab64cb8c0c993e8371ad77f
SHA256:
21938F5CE37A9126F4BC3E8E9C9614600D0F1E5960800106E181464D64DE0CC2
File Size:
208.38 KB, 208384 bytes
|
|
MD5:
e0755c0f028b6981021d67417f01f8db
SHA1:
886cdc387357f245a2786bb626ca34d7de6d074f
SHA256:
0E118AEC79C9773B1F7AA763E648D79F033F2725ECDBC6E4982A92B3CCFFA924
File Size:
208.38 KB, 208384 bytes
|
Show More
|
MD5:
cfd8d8d4b81ba87e49f51486e12f77af
SHA1:
7800aaa497d08b7104f7f6ac1504901db3aad95b
SHA256:
EE6E1C1054FB256ADD1E04509E580EADEB87DEEFB4D12B7096ECC1326B0082DB
File Size:
208.38 KB, 208384 bytes
|
|
MD5:
ed2e8e040c9faa327bd85d75dc14e59b
SHA1:
b6c6d72ce908d2e094f0b91a36a40ebd72598629
SHA256:
5A9522B6E3BE368881794693CBAA82F4B084558309F7806071A0536BB3BD0B0D
File Size:
208.38 KB, 208384 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have resources
- File doesn't have security information
- File has exports table
- File is 32-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Traits
- HighEntropy
- No Version Info
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 1,139 |
|---|---|
| Potentially Malicious Blocks: | 3 |
| Whitelisted Blocks: | 1,136 |
| Unknown Blocks: | 0 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Crysteb.AG