Threat Database Stealers Trojan.Stealer.HI

Trojan.Stealer.HI

By CagedTech in Stealers, Trojans

Threat Scorecard

Popularity Rank: 16,980
Threat Level: 80 % (High)
Infected Computers: 5
First Seen: September 1, 2021
Last Seen: November 25, 2025
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.Stealer.HI
Signature status: No Signature

Known Samples

MD5: 71c13d3cf7d12f013d4627841b2d5c28
SHA1: 017dd4a5450298d014a2102ef38633ef443cb1aa
SHA256: 3806EBD7FF35D1C9703F9ADD0BA32ADE41763D7A8851BCA5BBDEB076DB8B071F
File Size: 1.51 MB, 1507328 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
File Description CLedShowDemo Microsoft 基础类应用程序
File Version 1, 0, 0, 1
Internal Name CLedShowDemo
Legal Copyright 版权所有 (C) 2004
Original Filename CLedShowDemo.EXE
Product Name CLedShowDemo 应用程序
Product Version 1, 0, 0, 1

File Traits

  • HighEntropy
  • x86

Block Information

Total Blocks: 528
Potentially Malicious Blocks: 234
Whitelisted Blocks: 294
Unknown Blocks: 0

Visual Map

x x x x x 0 x x x x x 0 x x x 0 0 x 0 x 0 x x x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x x x x x 0 0 x 0 0 0 x 0 0 0 0 x 0 0 x x 0 x 0 x 0 0 x x x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x 0 0 0 0 x 0 x 0 0 x x x 0 x x x x 0 x x x x x x x x x x x 0 0 0 x x x 0 0 0 0 0 x 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 x x x 0 0 x 0 0 x x x x 0 x 0 0 0 0 x 0 0 0 x x 0 0 0 0 x 0 0 0 x 0 x x x 0 x 0 x x x x 0 0 0 x x x 0 x x x x x 0 0 x x 0 x x 0 x 0 x 0 0 x 0 x x x x x x x x x 0 0 0 x x x x 0 0 0 0 0 0 x 0 x x 0 x x x x x 0 x x 0 x x x x x x 0 x x 0 x 0 x x x 0 x x x 0 x 0 x x x x x x x x x 0 0 0 x 0 x x x 0 x x 0 x 0 0 0 0 0 x x 0 0 0 0 0 0 x x 0 x x x x 0 0 0 0 0 0 x x 0 x x x x x x x x 0 0 0 0 x 0 x 0 x x x 0 x x x x x x x 0 x x x x 0 x 0 x x 0 x 0 0 x x 0 x x 0 0 0 x 0 0 x x 0 x x x 0 0 0 0 0 0 0 x 0 0 x x 0 x x x x x x 0 x 0 x 0 0 x x 0 0 0 0 0 x x x 0 x x x x x x x 0 x 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Stealer.HI

Files Modified

File Attributes
c:\users\user\downloads\017dd4a5450298d014a2102ef38633ef443cb1aa_0001507328 Synchronize,Write Attributes
c:\windows\syswow64\dumdu.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\windows\syswow64\dumdu.exe Synchronize,Write Attributes

Registry Modifications

Key::Value Data API Name
HKLM\system\select::marktime 2025-11-25 17:27 RegNtPreCreateKey

Windows API Usage

Category API
Service Control
  • OpenSCManager
  • OpenService
  • StartService
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess

Shell Command Execution

C:\WINDOWS\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del c:\users\user\DOWNLO~1\017DD4~1 > nul

Trending

Most Viewed

Loading...