Threat Database Trojans Trojan.Rugmi.LB

Trojan.Rugmi.LB

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 16,267
Threat Level: 80 % (High)
Infected Computers: 12
First Seen: November 1, 2024
Last Seen: February 27, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.Rugmi.LB
Signature status: Hash Mismatch

Known Samples

MD5: e73790b1250a799b41dfde872f5bf679
SHA1: a35e93208d7aaec88f9daa928d1ea15f40b2246b
SHA256: 69F8BE0035EC70F291214BF805E0A0B3CFF5AEBC9EC70C165BEE3EABF00D4895
File Size: 311.45 KB, 311448 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File has exports table
  • File has TLS information
  • File is 32-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Company Name Alexander Roshal
File Description RAR decompression library
File Version 7.1.0
Legal Copyright Copyright © Alexander Roshal 1993-2024
Original Filename Unrar.dll
Product Name RAR decompression library
Product Version 7.1.0

Digital Signatures

Signer Root Status
win.rar GmbH DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1 Hash Mismatch

File Traits

  • dll
  • HighEntropy
  • x86

Block Information

Total Blocks: 985
Potentially Malicious Blocks: 159
Whitelisted Blocks: 816
Unknown Blocks: 10

Visual Map

x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? x ? 0 x ? ? ? ? ? ? x ? x 0 0 0 0 x 0 0 0 0 0 1 x x x 0 0 0 0 0 x x 0 0 x 0 0 x x x 0 x x x x x 0 x x 0 0 x 0 0 0 0 x 0 x 0 0 0 0 x 0 x 0 0 0 x 0 0 x 0 0 0 x 0 0 x x 0 0 0 0 x 0 0 0 0 0 0 x 0 x 0 0 x 0 x 0 0 0 x 0 0 0 0 0 0 0 0 x x 0 x 0 0 0 0 0 0 0 x x 0 x x x 0 0 0 x x x x x x 0 0 0 0 0 x 0 0 x 0 0 0 0 0 0 0 x 0 0 0 0 x x x 0 x x x x 0 0 x 0 x x x 0 x 0 x 0 0 0 0 0 0 0 x x x 0 x x 0 0 0 0 x 0 0 0 0 0 x x 0 0 0 x 0 x x 0 0 0 0 0 x x 0 0 0 x 0 0 0 0 0 0 0 0 x x 0 x 0 x x 0 0 x x x 0 0 0 0 x x 0 x 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 x 0 0 0 0 x 0 x x 0 0 0 0 0 0 0 0 x x 0 0 0 x 0 0 x 0 0 0 x 0 0 x x x x 0 0 0 x x x 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 x 0 0 0 x x x x 0 0 x 0 0 0 0 x 0 0 0 x 0 0 0 0 0 x 0 0 0 0 0 0 0 0 x x 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 x 0 0 0 0 0 0 x x x x x 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 x x x 0 x 0 x 0 0 0 0 0 0 0 0 0 x x x 0 0 0 0 0 0 x 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 x x 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x x x x 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 1 2 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 1 2 3 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 1 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 2 2 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 2 0 1 0 1 1 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Rugmi.JC

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtQueryAttributesFile
Show More
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWriteFile
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Anti Debug
  • NtQuerySystemInformation

Shell Command Execution

C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\a35e93208d7aaec88f9daa928d1ea15f40b2246b_0000311448.,LiQMAxHB

Trending

Most Viewed

Loading...