Threat Database Stealers Trojan.Stealer.T

Trojan.Stealer.T

By CagedTech in Stealers, Trojans

Threat Scorecard

Popularity Rank: 4,048
Threat Level: 80 % (High)
Infected Computers: 819
First Seen: March 17, 2021
Last Seen: February 26, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.Stealer.T
Signature status: No Signature

Known Samples

MD5: df0fc315243f9574ba8bbe384ef9db44
SHA1: 9370f1396dd2bca3e93ce233f948bf62d90433d1
SHA256: 84A7F9CFB737B72F2DC91F8FBC67104E48D48B53B23CAC897B083BE29EF76160
File Size: 753.66 KB, 753664 bytes
MD5: 5251813bf59529402eb2fb0845cf5cdc
SHA1: f904bf91dffa938a4df906e0cd57570bbc139aa2
SHA256: B6D8EDCE39B25B844A11BCC98380EC38EAE998F201B149D3AECE7D180B16326E
File Size: 372.74 KB, 372736 bytes
MD5: bc9214e38599ab33af95267362b54e8e
SHA1: d31fb264d8007a3c987651c613d044e1ed6089cb
SHA256: 6F59F046CE4813C38E55DFBB05CF3B53794719846E5882712EDC3C3F980D18C9
File Size: 569.75 KB, 569745 bytes
MD5: 169ef979e626e278fc6f14556593ab70
SHA1: 19a037aff06b2bff8e0a88cea91788189de8baeb
SHA256: 1E24BB6217CA5295F9AF3551C0D5D260DCF07F7817B5374C28E98BCE8D4CD3C9
File Size: 1.63 MB, 1626678 bytes
MD5: abae906b85a0a72c85924f684227e073
SHA1: add9013309318aa3ee2b40a32d2eb936d5783176
SHA256: 9B75C7B35099CE7D041F8FA64DD56C379A3974D9A220EAC8369B10B9B5AFB1A7
File Size: 721.92 KB, 721920 bytes
Show More
MD5: d8e648e892bba3da2c59e6fade318174
SHA1: 02db6a72f36001ccc4db3274f8e5644e12de3a75
SHA256: 9504DB3D7DBFC409AA788E60BBF8DDE97E01DEFE333F7ACA7568A4815BA7E6DF
File Size: 718.34 KB, 718336 bytes
MD5: ad4f29f9ee74e544f52b8b564edc7e4b
SHA1: 03c5ca7efd48d003fc735f4af8fa6e76944784f3
SHA256: 586BC5D9514951B56D80FE88AC2DD6B848AA9FDDA4C2336AFD3D3E44DA935FA1
File Size: 720.38 KB, 720384 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
File Version
  • 1.1.37.02
  • 1.1.33.10
  • 1.1.33.09
  • 1.00
  • 1, 0, 44, 04
Internal Name TJprojMain
Original Filename TJprojMain.exe
Product Name Project1
Product Version
  • 1.1.37.02
  • 1.1.33.10
  • 1.1.33.09
  • 1.00
  • 1, 0, 44, 04

File Traits

  • AutoHK
  • HighEntropy
  • WriteProcessMemory
  • x86

Block Information

Total Blocks: 1,870
Potentially Malicious Blocks: 181
Whitelisted Blocks: 1,689
Unknown Blocks: 0

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 x 0 0 0 0 0 x 0 0 0 x 0 0 0 0 0 0 0 0 x 0 0 x x x 0 0 x 0 0 x 0 0 0 0 0 0 x 0 x x x x x 0 x x x x x x 0 x x x x x 0 x x x x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 x 0 0 0 0 0 0 x 0 0 x 0 x 0 x 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 x 0 0 0 0 x 0 0 0 0 x 0 0 0 x x x x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 x 0 x x 0 x 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x x x 0 x x x x 0 x x 0 x 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 x x 0 0 x 0 0 0 0 0 0 0 0 x 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 x 0 0 0 0 x x 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 x 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 x 0 0 0 0 0 0 x x x 0 x x 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 x 0 0 x 0 0 0 0 0 x 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 x x 0 x 0 0 x 0 0 x x x 0 0 0 0 0 0 x x 0 0 0 x x 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 x 0 0 1 0 0 0 0 0 0 0 0 x x 0 x 0 0 0 0 0 x x x x 0 0 0 0 0 0 0 x 0 x 0 0 x 0 0 0 0 0 0 x 0 0 0 x 0 0 0 x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 x x x x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 1 0 1 1 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 2 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 1 1 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 2 2 2 3 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 1 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Khalesi.D
  • Stealer.B
  • Stealer.BC
  • Stealer.BE
  • Stealer.T

Files Modified

File Attributes
c:\users\user\appdata\local\temp\nsi4488.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete
c:\users\user\appdata\local\temp\nsx44e6.tmp Synchronize,Write Attributes
c:\users\user\downloads Generic Write,Read Attributes

Windows API Usage

Category API
Network Wininet
  • InternetOpen
  • InternetOpenUrl
Other Suspicious
  • SetWindowsHookEx
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation
Keyboard Access
  • GetAsyncKeyState

Related Posts

Trending

Most Viewed

Loading...