Threat Database Backdoors Backdoor.MSIL.Injector.VFA

Backdoor.MSIL.Injector.VFA

By CagedTech in Backdoors

Threat Scorecard

Popularity Rank: 11,780
Threat Level: 60 % (Medium)
Infected Computers: 1,952
First Seen: November 17, 2022
Last Seen: November 20, 2025
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Backdoor.MSIL.Injector.VFA
Signature status: Hash Mismatch

Known Samples

MD5: cba73589adfa6a465d9ce46f857b9076
SHA1: 7d999100808ec35f95db3f39d43e572bbb5774aa
SHA256: 1A432959748EB8E0C507A53BE9BE73AA79C9969DE80C41644A8317BE888191F2
File Size: 619.17 KB, 619166 bytes
MD5: 42981c07d22523c5d36671034b1589e0
SHA1: 9931b9770263635dc9c277e700075631bce26152
SHA256: 5A67A2EF2E7D4AD93CE51A279D31CFFF265F50ABDBB9FB0562253575F3CDD062
File Size: 339.59 KB, 339592 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is .NET application
  • File is 32-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
Show More
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Assembly Version 1.0.0.3
File Description Production Catches Collagis
File Version
  • 1.00
  • 1.0.0.3
Internal Name
  • Single.exe
  • TJprojMain
Legal Copyright Copyright © 2023
Original Filename
  • Single.exe
  • TJprojMain.exe
Product Name
  • Overchills
  • Project1
Product Version
  • 1.00
  • 1.0.0.3

Digital Signatures

Signer Root Status
NVIDIA Corporation DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1 Hash Mismatch
Microsoft Windows Hardware Compatibility Publisher Microsoft Windows Third Party Component CA 2012 Hash Mismatch

File Traits

  • .NET
  • HighEntropy
  • x86

Block Information

Total Blocks: 10
Potentially Malicious Blocks: 1
Whitelisted Blocks: 6
Unknown Blocks: 3

Visual Map

0 ? 0 ? 0 ? x 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • MSIL.Krypt.YAGF
  • MSIL.Stealer.FS

Files Modified

File Attributes
c:\users\user\appdata\local\microsoft\windows\usrclass.dat{dba6b5ef-640a-11ed-9bcb-f677369d361c}.txr.1.regtrans-ms Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\microsoft\windows\usrclass.dat{dba6b5ef-640a-11ed-9bcb-f677369d361c}.txr.2.regtrans-ms Generic Read,Write Data,Write Attributes,Write extended,Append data

Windows API Usage

Category API
Other Suspicious
  • SetWindowsHookEx
User Data Access
  • GetComputerNameEx
  • GetUserDefaultLocaleName
  • GetUserObjectInformation
Anti Debug
  • NtQuerySystemInformation
Process Manipulation Evasion
  • NtUnmapViewOfSection

Trending

Most Viewed

Loading...