Threat Database Trojans Trojan.TinyNuke.A

Trojan.TinyNuke.A

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 20,313
Threat Level: 80 % (High)
Infected Computers: 72
First Seen: August 21, 2017
Last Seen: February 6, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.TinyNuke.A
Signature status: No Signature

Known Samples

MD5: 94c2638291648f593cf4d40c7c4655f2
SHA1: cbd5102adb9126abb0846e0f6b7359fd468bf0fd
SHA256: FC29828F2364921B3DFC7B30BBC5037901FD852BFC640679AEC9AE04D9904547
File Size: 32.77 KB, 32768 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have resources
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Traits

  • No Version Info
  • x86

Block Information

Total Blocks: 28
Potentially Malicious Blocks: 24
Whitelisted Blocks: 4
Unknown Blocks: 0

Visual Map

x x x x x x x x x x 0 2 2 0 x x x x x x x x x x x x x x
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • TinyNuke.A

Files Modified

File Attributes
c:\users\user\appdata\local\temp\0ed00d722c161117388365 Generic Write,Read Attributes
c:\users\user\appdata\roaming\0ed00d722c161117388365\0ed00d722c161117388365.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144

Registry Modifications

Key::Value Data API Name
HKCU\software\microsoft\internet explorer\main::tabprocgrowth RegNtPreCreateKey
HKCU\software\microsoft\internet explorer\main::noprotectedmodebanner  RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\zones\3::2500  RegNtPreCreateKey

Windows API Usage

Category API
User Data Access
  • GetUserNameEx
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Network Winsock2
  • WSAStartup
Network Winsock
  • gethostbyname
  • socket

Shell Command Execution

C:\Users\Tctgogcb\AppData\Roaming\0ED00D722C161117388365\0ED00D722C161117388365.exe (NULL)

Trending

Most Viewed

Loading...