Win32/NukeSped
Windows Defender detects and removes this threat.
This threat can install other malware on your PC, including Trojan:Win32/NukeSped.B!dha and Trojan:Win32/NukeSped.C!dha. It can show you a warning message that says your files will be made publically available if you don't follow the malicious hacker's commands.
We have seen this threat used in targeted attacks against specific enterprises.
Trojan:Win32/NukeSped
Trojan:Win32/NukeSped is a modular remote access toolkit designed for sustained Windows compromise and data theft. Its 32-bit architecture ensures compatibility with a wide range of Windows environments, from older workstations to modern servers running 32-bit application support. The malware family includes loaders, remote access tools (RATs), and proxy components that allow threat actors to maintain persistent access, conduct reconnaissance, and exfiltrate sensitive information. The toolkit also includes features for keylogging, screen capture, and file theft, making it a versatile threat for targeted operations.
The malware employs multiple evasion techniques to avoid detection. It uses encrypted payloads that execute directly in memory without writing files to disk, abuses legitimate system processes to blend in with normal activity, and implements custom encryption protocols that mimic standard TLS traffic to bypass network monitoring. Its modular design allows threat actors to deploy only the specific components needed for each target, reducing the malware's footprint. The 32-bit variant remains a critical component for maintaining compatibility across diverse enterprise environments, particularly those with legacy systems.