Threat Database Trojans Win32/Delf.NRJ

Win32/Delf.NRJ

By GoldSparrow in Trojans

Threat Scorecard

Popularity Rank: 4,950
Threat Level: 90 % (High)
Infected Computers: 386
First Seen: January 12, 2016
Last Seen: April 14, 2026
OS(es) Affected: Windows

Win32/Delf.NRJ is a threatening program that is a Backdoor Trojan. The Win32/Delf.NRJ Backdoor Trojan is written in the Delphi programming language that allows it to load plug-ins and use COM independent interfaces. In other words, the handlers of the Win32/Delf.NRJ malware can expand its functionality and launch custom-made attacks on compromised computers and networks. The Win32/Delf.NRJ Backdoor Trojan may be deployed to users via malvertising involving exploit kits like Angler and Infinity. Security analysts add that the Win32/Delf.NRJ malware may be used in spear phishing attacks too. The Win32/Delf.NRJ Backdoor Trojan may be detected by security scanners under the names of Backdoor:Win32/Spamchn and Virus:Win32/Grenam as well. The Win32/Delf.NRJ Backdoor Trojan has interesting features that include the modification of executable files and shellcode execution.

The Win32/Delf.NRJ malware can use behavioral algorithms to recognize the user's preferred programs and alter their main executable to spread it to other users. For example, a user that is infected with the Win32/Delf.NRJ malware and may use Google Chrome as his default Internet client is very likely to have its primary executable altered by Win32/Delf.NRJ. When the infected user runs the corrupted Google Chrome browser, the Win32/Delf.NRJ Backdoor Trojan may copy itself to other computers and notify its operators of successful infiltration. Still, Win32/Delf.NRJ is a backdoor Trojan that can allow its handlers to close, and run and install programs on infected systems remotely. Additionally, the Win32/Delf.NRJ malware may use unencrypted HTTP channels to relay data from your computer to a remote host if instructed to. Security analysts reveal that the Win32/Delf.NRJ Backdoor Trojan may be used in DDoS attacks at servers and corporate networks. The Win32/Delf.NRJ malware may place its files in the Temporary Internet Files folder and label them as persistent cookies to hide them from security scanners. The Win32/Delf.NRJ malware can be deleted by a reputable anti-malware application that is worth investing in.

Analysis Report

General information

Family Name: Trojan.Klone.A
Signature status: No Signature

Known Samples

MD5: f7bacd4f795411eb2aaa923761fba789
SHA1: 613b2f039f2762cd80e91bb3083f9817355e1f5a
SHA256: AA5CD6EC750F81F45B7D25685BA14724716405EBB8B0AD0BE46FA290F5756390
File Size: 3.28 MB, 3277032 bytes
MD5: 2592261c2805582f88172f7fecfb2424
SHA1: 2875f02ca49ddbf825dd5650a0f3ffd8106cffbf
SHA256: AAEFD1097E3347A7C3B8AF0D149BB5AA9242AEC047DFE3E81C24C56F889CD0E1
File Size: 91.43 KB, 91434 bytes
MD5: 3ca17a48e261f5e2f84826419d2b4f2c
SHA1: 9fa5ba5399ae1b7fd9905a983f12ab2a684134b9
SHA256: C1042187A04C3C894324A35620B53CFF7C09191B4ED53FBEA85E3B443754CE12
File Size: 2.30 MB, 2302464 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments
  • GOM Encoder Setup File (2007-12-27 오후 1:50:03)
  • Secure your passwords
Company Reversing Labs
Company Name
  • Code|Aero Technologies
  • Gretech Corp.
File Description
  • GOM Encoder Setup File
  • Password Memory Executable
  • Reversing Labs Packer
File Version
  • 2.0.0.118
  • 1.20
Internal Name
  • Keynote
  • RLPACK.EXE
Legal Copyright
  • Copyright(C) 2006-2007 Gretech Corp.
  • Copyright © 2007-2008 Code|Aero Technologies
  • Reversing Labs (c) 2006-2007
Legal Trademarks Password Memory(tm)
Original Filename keynote.exe
Product Name
  • GOM Encoder
  • Password Memory
  • Reversing Labs Packer
Product Version
  • 2.0
  • 1.20

Digital Signatures

Signer Root Status
Gretech Corp. Thawte Premium Server CA Root Not Trusted

File Traits

  • 2+ executable sections
  • HighEntropy
  • x86
  • y0da

Block Information

Total Blocks: 2
Potentially Malicious Blocks: 1
Whitelisted Blocks: 1
Unknown Blocks: 0

Visual Map

0 x
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
c:\users\user\appdata\local\temp\nsac988.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete
c:\users\user\appdata\local\temp\nsqc999.tmp\langdll.dll Generic Write,Read Attributes

Windows API Usage

Category API
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation

Trending

Most Viewed

Loading...