Threat Database Trojans Trojan.ShadowBrokers

Trojan.ShadowBrokers

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 12,413
Threat Level: 80 % (High)
Infected Computers: 350,467
First Seen: May 1, 2017
Last Seen: January 29, 2026
OS(es) Affected: Windows

SpyHunter Detects & Remove Trojan.ShadowBrokers

File System Details

Trojan.ShadowBrokers may create the following file(s):
# File Name MD5 Detections
1. Eternalblue-2.2.0.exe 8c80dd97c37525927c1e549cb59bcbf3 49,760
2. Doublepulsar-1.3.1.exe c24315b0585b852110977dacafe6c8c1 21,212
3. libxml2.dll 9a5cec05e9c158cbc51cdc972693363d 21,209
4. posh-0.dll 2f0a52ce4f445c6e656ecebbcaceade5 21,158
5. exma-1.dll ba629216db6cf7c0c720054b0c9a13f3 20,956
6. ucl.dll 6b7276e4aa7a1e50735d2f6923b40de4 20,884
7. tibe-2.dll f0881d5a7f75389deba3eff3f4df09ac 20,806
8. tucl-1.dll 83076104ae977d850d1e015704e5730a 20,792
9. zlib1.dll e4ad4df4e41240587b4fe8bbcb32db15 17,101
10. libeay32.dll f01f09fe90d0f810c44dce4e94785227 17,014
11. ssleay32.dll 5e8ecdc3e70e2ecb0893cbda2c18906f 16,384
12. cnli-1.dll a539d27f33ef16e52430d3d2e92e9d5c 16,364
13. crli-0.dll f82fa69bfe0522163eb0cf8365497da2 16,345
14. dmgd-4.dll a05c7011ab464e6c353a057973f5a06e 15,643
15. WINSec.exe b60f2efacb26a2462b3d6e826f281ac4 27
16. 1710vps.exe 957b4fefdda7a1f41ad29413a67b76b1 0

Registry Details

Trojan.ShadowBrokers may create the following registry entry or registry entries:
Regexp file mask
%ALLUSERSPROFILE%\blue.fb
%ALLUSERSPROFILE%\blue.xml
%ALLUSERSPROFILE%\star.fb
%ALLUSERSPROFILE%\star.xml
%ALLUSERSPROFILE%\temp1.exe
%ALLUSERSPROFILE%\uname
%ALLUSERSPROFILE%\upass
%WINDIR%\temp\svchost[RANDOM CHARACTERS].(exe$|xml$)

Directories

Trojan.ShadowBrokers may create the following directory or directories:

%HOMEDRIVE%\SMB445

Analysis Report

General information

Family Name: Trojan.ShadowBrokers
Signature status: No Signature

Known Samples

MD5: 50ed4bc5359b56245cda608506c455c1
SHA1: 8652992562152f5298993c856df7dcc77b7f512b
SHA256: 5644607EF306F313F7256BB325FFEE95DDA27E379F0895F69CE68F903F141ACD
File Size: 159.74 KB, 159744 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have security information
  • File is .NET application
  • File is 32-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Assembly Version 1.0.0.0
File Description Eternalblue
File Version 1.0.0.0
Internal Name Eternalblue.exe
Legal Copyright Copyright © 2021
Original Filename Eternalblue.exe
Product Name Eternalblue
Product Version 1.0.0.0

File Traits

  • .NET
  • x86

Block Information

Total Blocks: 31
Potentially Malicious Blocks: 23
Whitelisted Blocks: 5
Unknown Blocks: 3

Visual Map

x x x x 0 x x 0 ? x x 0 x x x x x x x x x x x 0 x 0 x ? x x ?
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • MSIL.Metasploit.A

Registry Modifications

Key::Value Data API Name
HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe ᕽ땷මǜ RegNtPreCreateKey
HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe ᕽ땷මǜ RegNtPreCreateKey

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAlertThreadByThreadId
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClearEvent
  • ntdll.dll!NtClose
  • ntdll.dll!NtConnectPort
  • ntdll.dll!NtCreateEvent
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateMutant
  • ntdll.dll!NtCreatePrivateNamespace
  • ntdll.dll!NtCreateSection
Show More
  • ntdll.dll!NtCreateSemaphore
  • ntdll.dll!NtCreateThreadEx
  • ntdll.dll!NtDeviceIoControlFile
  • ntdll.dll!NtDuplicateObject
  • ntdll.dll!NtEnumerateKey
  • ntdll.dll!NtEnumerateValueKey
  • ntdll.dll!NtFlushProcessWriteBuffers
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenDirectoryObject
  • ntdll.dll!NtOpenEvent
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcess
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenSemaphore
  • ntdll.dll!NtOpenThread
  • ntdll.dll!NtOpenThreadToken
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryDefaultLocale
  • ntdll.dll!NtQueryDirectoryFileEx
  • ntdll.dll!NtQueryFullAttributesFile
  • ntdll.dll!NtQueryInformationFile
  • ntdll.dll!NtQueryInformationJobObject
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryLicenseValue
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQuerySecurityObject
  • ntdll.dll!NtQuerySystemInformation
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtQueryWnfStateData
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtReleaseMutant
  • ntdll.dll!NtReleaseSemaphore
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtRequestWaitReplyPort
  • ntdll.dll!NtResumeThread
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationKey
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationThread
  • ntdll.dll!NtSubscribeWnfStateChange
  • ntdll.dll!NtTerminateProcess
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtUnmapViewOfSectionEx
  • ntdll.dll!NtWaitForAlertByThreadId
  • ntdll.dll!NtWaitForMultipleObjects
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWriteFile
  • ntdll.dll!NtWriteVirtualMemory
  • UNKNOWN
  • win32u.dll!NtGdiBitBlt
  • win32u.dll!NtGdiCreateBitmap
  • win32u.dll!NtGdiCreateCompatibleDC
  • win32u.dll!NtGdiCreateDIBitmapInternal
  • win32u.dll!NtGdiCreateSolidBrush
  • win32u.dll!NtGdiDeleteObjectApp
  • win32u.dll!NtGdiExtGetObjectW
  • win32u.dll!NtGdiGetDCforBitmap
  • win32u.dll!NtGdiGetDCObject
  • win32u.dll!NtGdiRestoreDC
  • win32u.dll!NtGdiSaveDC
  • win32u.dll!NtGdiSelectBitmap
  • win32u.dll!NtGdiSetDIBitsToDeviceInternal
  • win32u.dll!NtUserCallNoParam
  • win32u.dll!NtUserConsoleControl
  • win32u.dll!NtUserCreateEmptyCursorObject
  • win32u.dll!NtUserGetDC
  • win32u.dll!NtUserGetGUIThreadInfo
  • win32u.dll!NtUserGetKeyboardLayout
  • win32u.dll!NtUserGetProcessWindowStation
  • win32u.dll!NtUserGetThreadState
  • win32u.dll!NtUserReleaseDC
  • win32u.dll!NtUserSelectPalette
  • win32u.dll!NtUserSetCursorIconData
  • win32u.dll!NtUserSetProcessDpiAwarenessContext
User Data Access
  • GetUserDefaultLocaleName
  • GetUserObjectInformation
Process Shell Execute
  • CreateProcess
  • WriteConsole
Anti Debug
  • IsDebuggerPresent
Process Terminate
  • TerminateProcess

Shell Command Execution

"cmd.exe" /c ""c:\users\user\downloads\8652992562152f5298993c856df7dcc77b7f512b_0000159744" exploit all"
WriteConsole: '"c:\users\user\
WriteConsole: file.

Related Posts

Trending

Most Viewed

Loading...