Threat Database Trojans Trojan.Snoozer

Trojan.Snoozer

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 18,291
Threat Level: 80 % (High)
Infected Computers: 84,182
First Seen: March 24, 2016
Last Seen: January 29, 2026
OS(es) Affected: Windows

SpyHunter Detects & Remove Trojan.Snoozer

File System Details

Trojan.Snoozer may create the following file(s):
# File Name MD5 Detections
1. Sixth.exe d2f6958ca8412960b7824da111e7c1ed 2,594
2. Snz.exe 3f5c7472188a9a5f09e482365b3a5c41 245
3. userid.dll 067e9ac67923a2cad1d67b2cefa0254e 187
4. A0034893.exe 4a00a689d1b572505d5bb2eed97e6ea7 151
5. Fifth.exe a0456346290d7cf65d029eaf7d960975 69
6. Seventh.exe 8b9b1fc858047a530e5b9bea45bcda16 27
7. trzBB06.tmp d26580a8d2ab3abac6dd5c9f06b66533 19
8. Genius.exe f542c923bcd0fbb77ddf2791ceda1d4d 4
9. DataMgr.exe d0a9e04130815a1d00f4077a535bbd52 3
More files

Registry Details

Trojan.Snoozer may create the following registry entry or registry entries:
Regexp file mask
%APPDATA%\DataMgr\DataMgr.exe
%APPDATA%\Fifth\Fifth.exe
%APPDATA%\Snz\snz.exe

Analysis Report

General information

Family Name: Trojan.Snoozer
Signature status: Self Signed

Known Samples

MD5: 62bf2ce05348019bbe7ff22cb3b90047
SHA1: 93a75418fb4f54233cb32003e9baa644e9a2e86f
SHA256: 21529004BBC59672B13C64CED20273866BBB1C1C83D92C7A8FABC75726508871
File Size: 137.54 KB, 137536 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Digital Signatures

Signer Root Status
HTTO GROUP Ltd GlobalSign CodeSigning CA - G2 Self Signed

Block Information

Total Blocks: 77
Potentially Malicious Blocks: 0
Whitelisted Blocks: 77
Unknown Blocks: 0

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Agent.M
  • Agent.MH
  • Agent.MI
  • Agent.MU
  • Autorun.LA
Show More
  • FakeAV.AU

Files Modified

File Attributes
c:\users\user\appdata\local\temp\nsj4795.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete
c:\users\user\appdata\local\temp\nsy46ba.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete
c:\users\user\appdata\local\temp\~nsu.tmp\au_.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144

Registry Modifications

Key::Value Data API Name
HKLM\system\controlset001\control\session manager::pendingfilerenameoperations \??\C:\Users\Zsxfeidy\AppData\Local\Temp\~nsu.tmp\Au_.exe RegNtPreCreateKey
HKLM\system\controlset001\control\session manager::pendingfilerenameoperations \??\C:\Users\Zsxfeidy\AppData\Local\Temp\~nsu.tmp\Au_.exe\??\C:\Users\Zsxfeidy\AppData\Local\Temp\~nsu.tmp RegNtPreCreateKey

Windows API Usage

Category API
Process Shell Execute
  • CreateProcess

Shell Command Execution

"C:\Users\Zsxfeidy\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=c:\users\user\downloads\

Trending

Most Viewed

Loading...