Threat Database Trojans Win32/Delf.NRJ

Win32/Delf.NRJ

By GoldSparrow in Trojans

Threat Scorecard

Popularity Rank: 7,101
Threat Level: 90 % (High)
Infected Computers: 323
First Seen: January 12, 2016
Last Seen: November 15, 2025
OS(es) Affected: Windows

Win32/Delf.NRJ is a threatening program that is a Backdoor Trojan. The Win32/Delf.NRJ Backdoor Trojan is written in the Delphi programming language that allows it to load plug-ins and use COM independent interfaces. In other words, the handlers of the Win32/Delf.NRJ malware can expand its functionality and launch custom-made attacks on compromised computers and networks. The Win32/Delf.NRJ Backdoor Trojan may be deployed to users via malvertising involving exploit kits like Angler and Infinity. Security analysts add that the Win32/Delf.NRJ malware may be used in spear phishing attacks too. The Win32/Delf.NRJ Backdoor Trojan may be detected by security scanners under the names of Backdoor:Win32/Spamchn and Virus:Win32/Grenam as well. The Win32/Delf.NRJ Backdoor Trojan has interesting features that include the modification of executable files and shellcode execution.

The Win32/Delf.NRJ malware can use behavioral algorithms to recognize the user's preferred programs and alter their main executable to spread it to other users. For example, a user that is infected with the Win32/Delf.NRJ malware and may use Google Chrome as his default Internet client is very likely to have its primary executable altered by Win32/Delf.NRJ. When the infected user runs the corrupted Google Chrome browser, the Win32/Delf.NRJ Backdoor Trojan may copy itself to other computers and notify its operators of successful infiltration. Still, Win32/Delf.NRJ is a backdoor Trojan that can allow its handlers to close, and run and install programs on infected systems remotely. Additionally, the Win32/Delf.NRJ malware may use unencrypted HTTP channels to relay data from your computer to a remote host if instructed to. Security analysts reveal that the Win32/Delf.NRJ Backdoor Trojan may be used in DDoS attacks at servers and corporate networks. The Win32/Delf.NRJ malware may place its files in the Temporary Internet Files folder and label them as persistent cookies to hide them from security scanners. The Win32/Delf.NRJ malware can be deleted by a reputable anti-malware application that is worth investing in.

Analysis Report

General information

Family Name: Trojan.Klone.A
Signature status: No Signature

Known Samples

MD5: f7bacd4f795411eb2aaa923761fba789
SHA1: 613b2f039f2762cd80e91bb3083f9817355e1f5a
SHA256: AA5CD6EC750F81F45B7D25685BA14724716405EBB8B0AD0BE46FA290F5756390
File Size: 3.28 MB, 3277032 bytes
MD5: 2592261c2805582f88172f7fecfb2424
SHA1: 2875f02ca49ddbf825dd5650a0f3ffd8106cffbf
SHA256: AAEFD1097E3347A7C3B8AF0D149BB5AA9242AEC047DFE3E81C24C56F889CD0E1
File Size: 91.43 KB, 91434 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments GOM Encoder Setup File (2007-12-27 오후 1:50:03)
Company Reversing Labs
Company Name Gretech Corp.
File Description
  • GOM Encoder Setup File
  • Reversing Labs Packer
File Version 1.20
Internal Name RLPACK.EXE
Legal Copyright
  • Copyright(C) 2006-2007 Gretech Corp.
  • Reversing Labs (c) 2006-2007
Product Name
  • GOM Encoder
  • Reversing Labs Packer
Product Version 1.20

Digital Signatures

Signer Root Status
Gretech Corp. Thawte Premium Server CA Root Not Trusted

File Traits

  • 2+ executable sections
  • HighEntropy
  • x86
  • y0da

Block Information

Total Blocks: 17
Potentially Malicious Blocks: 3
Whitelisted Blocks: 2
Unknown Blocks: 12

Visual Map

0 ? x ? 0 x x ? ? ? ? ? ? ? ? ? ?
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
c:\users\user\appdata\local\temp\nsac988.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete
c:\users\user\appdata\local\temp\nsqc999.tmp\langdll.dll Generic Write,Read Attributes

Windows API Usage

Category API
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation

Trending

Most Viewed

Loading...