Threat Database Backdoors Backdoor.CsgoInjector.TA

Backdoor.CsgoInjector.TA

By CagedTech in Backdoors

Threat Scorecard

Popularity Rank: 18,390
Threat Level: 60 % (Medium)
Infected Computers: 424
First Seen: December 2, 2022
Last Seen: March 21, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Backdoor.CsgoInjector.TA
Signature status: No Signature

Known Samples

MD5: ae32bc33b3bd057597d12a7d0f8f3ea2
SHA1: 4b4fecc880de99e64edbcbbf32cb85e73f4b79d9
SHA256: 09A4CF66417EB20FAEECBE4EF7A236B6BAB2C9F60B0D317FDD1FC87968A251E9
File Size: 1.39 MB, 1391616 bytes
MD5: f05fc02587d1e2d402389f3bafd93bb6
SHA1: 6cceb24f597dfd08ccf8ad9b1d89a7c33085cc52
SHA256: 1794548B1B4C8E513781E48E17406C3B742EC62BA1BCD362C1E298E62E218725
File Size: 1.73 MB, 1731584 bytes
MD5: 98bca2b096a02f6415b8e56192f8fe8a
SHA1: bc0d56a6b20041323f48c15d0c81d08ff03fea5b
SHA256: 817A189664969A0D13BD626ACDBFDA615D7B7967C1120739B4FFDEBB1D7AC17A
File Size: 1.94 MB, 1942512 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has TLS information
  • File is 32-bit executable
  • File is 64-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
Show More
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments This installation was built with Inno Setup.
Company Name FreeTP.Org - Aliens Fireteam Elite Multiplayer Fix
File Description Aliens Fireteam Elite
Product Name Aliens Fireteam Elite
Product Version 1-1

File Traits

  • .vmp0
  • 2+ executable sections
  • dll
  • GetConsoleWindow
  • HighEntropy
  • imgui
  • No Version Info
  • ntdll
  • x64

Block Information

Similar Families

  • Downloader.Agent.BTF

Files Modified

File Attributes
c:\users\user\appdata\local\temp\is-d7oag.tmp\bc0d56a6b20041323f48c15d0c81d08ff03fea5b_0001942512.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-vuvgg.tmp\_isetup\_setup64.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-vuvgg.tmp\_isetup\_shfoldr.dll Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-vuvgg.tmp\get_hw_caps.dll Generic Write,Read Attributes

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
User Data Access
  • GetUserObjectInformation

Shell Command Execution

"C:\Users\Domkgznw\AppData\Local\Temp\is-D7OAG.tmp\bc0d56a6b20041323f48c15d0c81d08ff03fea5b_0001942512.tmp" /SL5="$90370,1449882,152064,c:\users\user\downloads\bc0d56a6b20041323f48c15d0c81d08ff03fea5b_0001942512"

Trending

Most Viewed

Loading...