Threat Database Trojans Trojan:Win32/Dembr.A

Trojan:Win32/Dembr.A

By Domesticus in Trojans

Threat Scorecard

Popularity Rank: 11,311
Threat Level: 90 % (High)
Infected Computers: 1,622
First Seen: March 27, 2013
Last Seen: February 7, 2026
OS(es) Affected: Windows

Trojan:Win32/Dembr.A is a Trojan that deletes the Master Boot Record (MBR), and, thus, makes the compromised unusable.

Trojan:Win32/Dembr.A encompasses a code to make sure that it only starts after 14:00, on March 20, any given year. Trojan:Win32/Dembr.A may make Trojan:Win32/Dembr.A may make continuous modifications to the compromised PC that will not be restored by founding and uninstalling this malware infection. Therefore, affected computer users will need to reinstall Windows, and restore the victimized computer from backup. When installed, Trojan:Win32/Dembr.A will restrict victims from starting the computer system. Trojan:Win32/Dembr.A will prevent PC users from using Ahnlab and Hauri anti-virus applications if it detects either on the targeted PC. Trojan:Win32/Dembr.At then makes modifications to the Master Boot Record (MBR) so that, if the computer user strives to reboot the PC, it will not launch. Trojan:Win32/Dembr.A strives to bypass the detection and removal by embedding a code into the genuine Windows process 'svchost.exe'.

File System Details

Trojan:Win32/Dembr.A may create the following file(s):
# File Name Detections
1. schsvcsc.exe
2. schsvcsc.dll
3. update.ex

Analysis Report

General information

Family Name: Trojan.Bitcoinminer.FDA
Signature status: No Signature

Known Samples

MD5: c1e8353bee8d89f1cc55fe19a71f6b38
SHA1: fe86da9697d2bc11540cbf7dfcd0c2e0430fc6d0
SHA256: D26E6601BED8B1A1E9AF1BD088080852BAE0979450C36F7DE2F51FEDB4C852D6
File Size: 98.30 KB, 98304 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have resources
  • File doesn't have security information
  • File has exports table
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Traits

  • dll
  • HighEntropy
  • x86

Block Information

Total Blocks: 251
Potentially Malicious Blocks: 50
Whitelisted Blocks: 196
Unknown Blocks: 5

Visual Map

? 0 ? 0 x x ? ? ? 0 0 x x 0 x x x x x x x x x x 0 x x x x x x x x x x x x x 0 x x 0 0 x 0 x x x x x x x x x x x x x 0 x x 0 x x x x 0 x 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtQueryAttributesFile
Show More
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWriteFile
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Anti Debug
  • NtQuerySystemInformation

Shell Command Execution

C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\fe86da9697d2bc11540cbf7dfcd0c2e0430fc6d0_0000098304.,LiQMAxHB

Trending

Most Viewed

Loading...