Threat Database Trojans Trojan.Lamer.BK

Trojan.Lamer.BK

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 4,629
Threat Level: 80 % (High)
Infected Computers: 976
First Seen: January 24, 2023
Last Seen: February 25, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.Lamer.BK
Signature status: Root Not Trusted

Known Samples

MD5: 1b20af49df6ef9bebb9325b2ae574f56
SHA1: 417a1eb20a66ee75c43bba471dc3a7f4562b5b59
File Size: 3.05 MB, 3045968 bytes
MD5: 445836526c19ff02db7cf6fa876e24a8
SHA1: 63434bc05c61f679770034f16fe7cb3270c7edcd
SHA256: 2D7DE0FA5EBB1F2D2C2F0CC6898BA8A7CADA1AC7A2608C502F6A5DAB196FA1A3
File Size: 1.48 MB, 1475944 bytes
MD5: a8a7d1eb767181be3e010337dc590719
SHA1: df60b3510e9b7fec215a60f171cbbb20945efe48
SHA256: C7E9A524C2D9841A8549A1495CBD7D9C762BF29FBB809FAECE7495D356B4EB70
File Size: 343.46 KB, 343464 bytes
MD5: bc7e28b01dc3d3a061118adbce53b57d
SHA1: 69476c82cb53cdd63129a091ae161607e225ad93
SHA256: 81299F1AFDD0EDE27880402E0E68FA4C383D5C81B51F3D48E7BA5D9358DFAB61
File Size: 403.58 KB, 403576 bytes
MD5: 64ca2a4c7dbf60abfd6454e260d5cd62
SHA1: 46b97de0eda7dd839a3efe7f763ccdaa7c3a09b7
SHA256: FB98FA8B12E48D0082761231285D8569B87AD150B29EA1077C90B299A964F7D7
File Size: 319.08 KB, 319080 bytes
Show More
MD5: 594d2424edf58333e1731069376f378d
SHA1: d85e902631745e0b1ba28da783c7dd95a91f6fd2
SHA256: CB754F7DD97555B13A16DD9A24A3A3E5E8D186729C4F16480893F5E12B28662E
File Size: 869.20 KB, 869198 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Assembly Version
  • 4.5.0.0
  • 1.0.0.0
Comments
  • Server Manager of WKFramework
  • This installation was built with Inno Setup.
Company Name
  • IT Works Corporation
  • RevolutionarySoftware.Com
  • WKI - OA Sistemi Software Factory
File Description
  • Auction Bargain Detector Setup
  • Ez OFF Setup
  • GSX Resigner1
  • manage
  • PTXDIT
  • ServerManager assembly
File Version
  • 4.7.6
  • 4.5.0.0
  • 1.0.0.2
  • 1.0.0.0
Internal Name
  • GSX Resigner1.exe
  • manage.exe
  • PTXDIT.exe
  • ServerManager.exe
Legal Copyright
  • Copyright © 2009
  • Copyright © 2012
  • IT Works Corporation
  • OA Sistemi
  • RevolutionarySoftware.Com
Original Filename
  • GSX Resigner1.exe
  • manage.exe
  • PTXDIT.exe
  • ServerManager.exe
Product Name
  • Ez OFF
  • GSX Resigner1
  • manage
  • PTXDIT
Product Version
  • 4.7.6
  • 4.5.0.0
  • 1.0.0.0

Digital Signatures

Signer Root Status
IT Works Corporation Thawte Premium Server CA Root Not Trusted

File Traits

  • big overlay
  • x86

Block Information

Similar Families

  • Banload.X

Files Modified

File Attributes
c:\programdata\microsoft\crypto\rsa\machinekeys\089189092c9af742ea27309b63e81914_bfeb5820-9643-42ad-a79f-071dff4d8e64 Generic Write,Read Attributes
c:\programdata\microsoft\crypto\rsa\machinekeys\439e44c5159355cb4d4aaacff8b6b8b4_bfeb5820-9643-42ad-a79f-071dff4d8e64 Generic Write,Read Attributes
c:\programdata\microsoft\crypto\rsa\machinekeys\8b9129f8b77b4cc88386f1deea5e4ddc_bfeb5820-9643-42ad-a79f-071dff4d8e64 Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-re2o4.tmp\417a1eb20a66ee75c43bba471dc3a7f4562b5b59_0003045968.tmp Generic Write,Read Attributes
c:\users\user\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-3119368278-1123331430-659265220-1001 Generic Write,Read Attributes
c:\users\user\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-3119368278-1123331430-659265220-1001\2876f66e7f9858baac7d57556c530d03_bfeb5820-9643-42ad-a79f-071dff4d8e64 Generic Write,Read Attributes
c:\users\user\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-3119368278-1123331430-659265220-1001\3ae51ddf87e3defd986804f81b82abe1_bfeb5820-9643-42ad-a79f-071dff4d8e64 Generic Write,Read Attributes
c:\users\user\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-3119368278-1123331430-659265220-1001\3f5e6051489dcbb8507d848a49bf60f1_bfeb5820-9643-42ad-a79f-071dff4d8e64 Generic Write,Read Attributes
c:\users\user\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-3119368278-1123331430-659265220-1001\5dfaf7ad38ddfcf8f9819de9d126bbbc_bfeb5820-9643-42ad-a79f-071dff4d8e64 Generic Write,Read Attributes
c:\users\user\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-3119368278-1123331430-659265220-1001\94801a8f9984241bf84b3ba118583248_bfeb5820-9643-42ad-a79f-071dff4d8e64 Generic Write,Read Attributes
Show More
c:\users\user\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-3119368278-1123331430-659265220-1001\9d674e63a6319e2841c7a250ae6bcae6_bfeb5820-9643-42ad-a79f-071dff4d8e64 Generic Write,Read Attributes
c:\users\user\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-3119368278-1123331430-659265220-1001\9d674e63a6319e2841c7a250ae6bcae6_bfeb5820-9643-42ad-a79f-071dff4d8e64_deleted_ Generic Write,Read Attributes
c:\users\user\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-3119368278-1123331430-659265220-1001\9d674e63a6319e2841c7a250ae6bcae6_bfeb5820-9643-42ad-a79f-071dff4d8e64_deleted__deleted_ Generic Write,Read Attributes
c:\users\user\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-3119368278-1123331430-659265220-1001\9d674e63a6319e2841c7a250ae6bcae6_bfeb5820-9643-42ad-a79f-071dff4d8e64_deleted__deleted__deleted_ Generic Write,Read Attributes
c:\users\user\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-3119368278-1123331430-659265220-1001\9d674e63a6319e2841c7a250ae6bcae6_bfeb5820-9643-42ad-a79f-071dff4d8e64_deleted__deleted__deleted__deleted_ Generic Write,Read Attributes
c:\users\user\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-3119368278-1123331430-659265220-1001\c1fbd70d44cf2ffa6b1a8701c2afadd3_bfeb5820-9643-42ad-a79f-071dff4d8e64 Generic Write,Read Attributes
c:\users\user\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-3119368278-1123331430-659265220-1001\ee64dde0cb12eea52def8094878a50ca_bfeb5820-9643-42ad-a79f-071dff4d8e64 Generic Write,Read Attributes
c:\users\user\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-3119368278-1123331430-659265220-1001\f2f21a618891abf0cb9e019cd85e606d_bfeb5820-9643-42ad-a79f-071dff4d8e64 Generic Write,Read Attributes
c:\users\user\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-3119368278-1123331430-659265220-1001\f3908a4f38af90ca6a12fff0dbaac1a6_bfeb5820-9643-42ad-a79f-071dff4d8e64 Generic Write,Read Attributes
c:\users\user\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-3119368278-1123331430-659265220-1001\f54951b4fc460ed17c1e642b65a349d6_bfeb5820-9643-42ad-a79f-071dff4d8e64 Generic Write,Read Attributes
c:\windows\appcompat\programs\amcache.hve Read Data,Read Control,Write Data
c:\windows\appcompat\programs\amcache.hve.log1 Read Data,Write Data
c:\windows\appcompat\programs\amcache.hve.log2 Read Data,Write Data
c:\windows\assembly Synchronize,Write Attributes

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
  • ReadProcessMemory
Process Shell Execute
  • CreateProcess
User Data Access
  • GetUserObjectInformation
Anti Debug
  • IsDebuggerPresent
  • NtQuerySystemInformation
Encryption Used
  • BCryptOpenAlgorithmProvider
  • CryptAcquireContext

Shell Command Execution

"C:\Users\Vpxakttt\AppData\Local\Temp\is-RE2O4.tmp\417a1eb20a66ee75c43bba471dc3a7f4562b5b59_0003045968.tmp" /SL5="$30276,2683923,75776,c:\users\user\downloads\417a1eb20a66ee75c43bba471dc3a7f4562b5b59_0003045968.exe"
C:\Windows\Microsoft.NET\Framework\v2.0.50727\\dw20.exe dw20.exe -x -s 1124

Trending

Most Viewed

Loading...