Threat Database Stealers Trojan.Stealer.GVB

Trojan.Stealer.GVB

By CagedTech in Stealers, Trojans

Analysis Report

General information

Family Name: Trojan.Stealer.GVB
Signature status: Hash Mismatch

Known Samples

MD5: 377e938953bede96e5ce01e01cb5fb68
SHA1: a355a5fc23880c69f924a9db4d83cbad48f7665f
SHA256: 2F30053710D3D4027C8731AD4F161E6308E6C124D53569C1992D8F2661985C00
File Size: 4.03 MB, 4027432 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File is 64-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name VirginiaLLC
File Description VirginiaLLC Encoder
File Version 12.4.22.0
Internal Name VirginiaLLC.exe
Legal Copyright Copyright (C) 2025
Original Filename VirginiaLLC binary #fafaa54.exe
Product Name VirginiaLLC Encoder
Product Version 12.4.22.0

Digital Signatures

Signer Root Status
NVIDIA Corporation DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1 Hash Mismatch

File Traits

  • fptable
  • x64

Block Information

Total Blocks: 7,924
Potentially Malicious Blocks: 2,355
Whitelisted Blocks: 5,530
Unknown Blocks: 39

Visual Map

0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 0 ? ? ? 0 ? ? ? ? ? ? 0 0 ? x x x ? ? ? ? ? 0 0 1 x 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 x 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 x 0 0 0 0 x 0 0 0 0 x 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 x x 0 0 0 0 0 0 0 x x 0 0 x 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 x x x x x 0 x 0 x x x x x x x x x x x x x x 0 x 0 x 0 x x x x x x 0 x x 0 x x x x x x x x 0 x x x x x x x 0 x x x x x 0 x x 0 0 x x x x 0 x x x x x x x x x x x x x x x x x 0 0 x 0 x x x x x x x x x 0 x x x x x x x 0 0 x x x x x x x x x x x 0 x x x x x x x 0 0 x x x x x x x x x x x x x 0 x x 0 x 0 x x x x x x 0 0 x x x x x 0 x x x x 0 x x 0 0 x x x x x x x x x x 0 0 x 0 0 x 0 x 0 x x x 0 0 0 x 0 0 0 x x x 0 0 x x x x x x x x x x 0 0 x x x x x x x x x x x x x x x x x x x x x x x x x x 0 0 0 0 x 0 x x x x 0 0 x x x x x x x x x x x x 0 x x x x x x x x x x x x x x x x x 0 x x x x x 0 x x x 0 x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x 0 x x x 0 x 0 x x x x x x x x x x x x x x x x x x x x x x x 0 x x x 0 0 x 0 x 0 0 0 0 x 0 x x x x 0 0 0 0 0 0 x 0 x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 0 x 0 x 0 x x x x x x x x x 0 x x x x x x x 0 x x x 0 x 0 x x x x x 0 0 0 x x 0 x x x 0 x x x x x x x x x x x x x 0 x x x 0 0 0 x x 0 0 x x x x x x 0 x 0 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 0 x x x x x x x x x x 0 0 x x x x x x x x x x x x x x 0 0 x x x x x x x x 0 x x 0 0 0 0 0 x x x x 0 x x x x 0 x x x x x x 0 x x 0 x x x x 0 x 0 x 0 x x 0 x x x x 0 x x x 0 x x x x x x x x x x 0 x 0 0 x x x 0 x x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x 0 x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x x x 0 x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x x x x x x x 0 x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x 0 0 0 x x x x x x x x x x x x x x 0 x 0 x x x 0 x x 0 x 0 x x x x x x 0 x x 0 x x x x x x x x x 0 x x x x x x x x 0 x 0 x x x x 0 x x x x x x x x x x x x 0 x x x x 0 x x x x x x x x 0 x x x x x x x x x x x x x 0 0 x x x x x x x x 0 0 0 x x x x x 0 x x x x x x x x x 0 x x x x x 0 x x x x x x 0 x x x x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x x 0 x 0 x x x 0 x x x x x x x x x x x x x 0 x x x x 0 x x x x x x x x x x x 0 x 0 x x x x 0 x x x x x x x x x x x x x x x x x 0 x x 0 x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x 0 x x x x x x x x x x x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x 0 0 x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x 0 x x 0 x x x x x x x x x 0 x x x x x x x x x 0 x 0 x x x x x x x x x x x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x x x x x x x 0 x x x x x x x x x x x x x x 0 x x x x x x x x x 0 0 x x x x x x x x 0 x x x x 0 x x x 0 0 x x x x x x x x x 0 x x x x x x x x x x x x x x x 0 0 0 0 0 0 0 x 0 x x x 0 x x x x x x x x x x x 0 x 0 x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x 0 x x x x x x x x x 0 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x x x x 0 0 x x x 0 0 x x 0 x x x x x x x x x x 0 x x x x x x x x 0 0 x x x x x x x x x x x x x x x x x x x 0 x 0 x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 0 x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 0 x x x x x x x x x x x x x x x x x x 0 0 x x x x x 0 0 x 0 x x x x x x x
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Stealer.GVB

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAlertThreadByThreadId
  • ntdll.dll!NtAlpcConnectPort
  • ntdll.dll!NtAlpcConnectPortEx
  • ntdll.dll!NtAlpcCreateResourceReserve
  • ntdll.dll!NtAlpcCreateSecurityContext
  • ntdll.dll!NtAlpcQueryInformation
  • ntdll.dll!NtAlpcQueryInformationMessage
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtAlpcSetInformation
  • ntdll.dll!NtApphelpCacheControl
Show More
  • ntdll.dll!NtAssociateWaitCompletionPacket
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateEvent
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateIoCompletion
  • ntdll.dll!NtCreateKey
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtCreateTimer2
  • ntdll.dll!NtCreateWaitCompletionPacket
  • ntdll.dll!NtCreateWorkerFactory
  • ntdll.dll!NtDeviceIoControlFile
  • ntdll.dll!NtDuplicateObject
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtGetCompleteWnfStateSubscription
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtNotifyChangeKey
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenThreadToken
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtQueryWnfStateData
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationThread
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtSubscribeWnfStateChange
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtTraceEvent
  • ntdll.dll!NtWaitForAlertByThreadId
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWorkerFactoryWorkerReady
  • ntdll.dll!NtWriteFile
  • ntdll.dll!NtWriteVirtualMemory
  • win32u.dll!NtUserCallTwoParam
  • win32u.dll!NtUserGetKeyboardLayout
  • win32u.dll!NtUserGetThreadState
User Data Access
  • GetUserName
Network Wininet
  • InternetOpen
  • InternetOpenUrl
  • InternetReadFile

Trending

Most Viewed

Loading...