Threat Database Trojans Trojan.Tuscas.AA

Trojan.Tuscas.AA

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 13,968
Threat Level: 80 % (High)
Infected Computers: 622
First Seen: June 29, 2019
Last Seen: October 10, 2025
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.Tuscas.AA
Signature status: No Signature

Known Samples

MD5: e130b19f6165f4db27869370d987e834
SHA1: ef65c4996ace2911a678ae59acc3ff4680a89956
SHA256: 019E032D9AF864AE8AD476A13B390172B74FDCD9DE49656465D0F41CE5C34F0E
File Size: 250.37 KB, 250368 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Traits

  • HighEntropy
  • No Version Info
  • x86

Block Information

Total Blocks: 13
Potentially Malicious Blocks: 9
Whitelisted Blocks: 4
Unknown Blocks: 0

Visual Map

x 0 0 x x 0 0 x x x x x x
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Tuscas.AA
  • Tuscas.AB

Files Modified

File Attributes
c:\users\user\appdata\local\temp\~aa53.tmp Generic Write,Read Attributes
c:\users\user\appdata\roaming\cmdlwwiz\rrinubst.exe Generic Write,Read Attributes
c:\windows\syswow64\spattray.exe Generic Write,Read Attributes

Registry Modifications

Key::Value Data API Name
HKCU\software\microsoft\windows\currentversion\run::mobsdown C:\Users\Hucqbzlq\AppData\Roaming\cmdlwwiz\rrinubst.exe RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\explorer\startupapproved\run::mobsdown RegNtPreCreateKey

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
  • VirtualAllocEx
Process Shell Execute
  • CreateProcess
Service Control
  • OpenSCManager
Syscall Use
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtClose
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtReleaseWorkerFactoryWorker
Show More
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSectionEx
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWriteFile
  • ntdll.dll!NtWriteVirtualMemory
  • win32u.dll!NtUserGetKeyboardLayout
  • win32u.dll!NtUserGetThreadState
Process Terminate
  • TerminateProcess

Shell Command Execution

C:\Users\Hucqbzlq\AppData\Roaming\cmdlwwiz\rrinubst.exe "C:\Users\Hucqbzlq\AppData\Roaming\cmdlwwiz"
C:\Users\Hucqbzlq\AppData\Local\Temp\~AA53.tmp 2536 250376 1064 1

Trending

Most Viewed

Loading...