Trojan.CsgoHack.E
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 11,828 |
| Threat Level: | 80 % (High) |
| Infected Computers: | 1,639 |
| First Seen: | September 12, 2021 |
| Last Seen: | March 9, 2026 |
| OS(es) Affected: | Windows |
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.CsgoHack.E |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
7e092fa32f66fd8d4a6fdaf0fa206421
SHA1:
994963eddd0b199ff4816470e911f9c1b8319e0a
File Size:
215.55 KB, 215552 bytes
|
|
MD5:
24a4b023440bb6d1ac755a4b1222e946
SHA1:
9cb64c9a73e824dc3f0c59a2c4935649c55a2764
File Size:
114.18 KB, 114176 bytes
|
|
MD5:
f266b8657365379be92defe57333f116
SHA1:
7484c1c4ed21fbe1be82a5524006d7a422a46bb8
File Size:
109.06 KB, 109056 bytes
|
|
MD5:
8db65b948908ba52c010fb456348aafd
SHA1:
b8ff21a1dea1adc804507dfbd075b55e44394028
File Size:
113.15 KB, 113152 bytes
|
|
MD5:
1aa515b3bb76316a786f679d95638d0a
SHA1:
40f8c8374d05c05aafacc6817c1178092c0ad530
SHA256:
4EDBCDA0C75713203FBB1EFC93F193BBDCBA6C7DFA9036EA9569038D838FC5DE
File Size:
75.78 KB, 75776 bytes
|
Show More
|
MD5:
678e742373b74d448592550beb20d4af
SHA1:
6ebe3144806fa51aca2bdb5873290583647955ce
SHA256:
8AB5EE8A14259EB7AC17CFC8A26472B8CD25E60C3BF0B9E38DCF3BCF572466A6
File Size:
173.57 KB, 173568 bytes
|
|
MD5:
eaf01ae5c06678d76041417bf1c2b684
SHA1:
c3544f78b8532ecd80e56d7c4ac62ad05eb11a17
SHA256:
97F2814E69C8D644E8384394B546827C7A914471B385B8EB34AC7A0F3B7C7A03
File Size:
119.30 KB, 119296 bytes
|
|
MD5:
4041ea1a4cef59cc9d184bab4fdd2ff9
SHA1:
d800d906e5ec20b1b803a85b535df224d506e708
SHA256:
926DE213983C057F331BDDF9766350FF244A353BC959A3D29C91B9E5EC7834D8
File Size:
86.53 KB, 86528 bytes
|
|
MD5:
f4bae91fc5d33dbea1363b79c7ca9075
SHA1:
3a9fed501f03229d596903177ad04f844aceee1e
SHA256:
220653DCFB5360D6DCAD3A042DD9611349B56AB228C41A4B17E511C27E6DC16F
File Size:
77.31 KB, 77312 bytes
|
|
MD5:
51b0f30729f5bb08193f789a668a400c
SHA1:
c86ae4ffa7487fa45d33264f58cff0d95c6c0016
SHA256:
152C598DB29ED60900551D12CCED407B39E8F8E72B3A5CB9AF7F017508231999
File Size:
137.22 KB, 137216 bytes
|
|
MD5:
587a6ea253485e0ef5b74290345792ed
SHA1:
8587290e1d34b5313fa1bd9d4adf648c3529fe71
SHA256:
57754FFE8347441FDA6E20E9831E18E89A259BE9C6D146C70CF0185CB676D550
File Size:
86.02 KB, 86016 bytes
|
|
MD5:
a72f68a25d9797f663a6556564448b46
SHA1:
a0a9861609f1e0c0de7b7190b6c40004b6639a3b
SHA256:
E6B7FB335BD500B42DE9B342D17AC33350ADDF3CBC56B633715D4951107DB2C8
File Size:
154.11 KB, 154112 bytes
|
|
MD5:
0c8cf4be0562b6e8da959d0ac74295ef
SHA1:
ce317d99d5d93f63671788e8123a1bcdad7f3d3a
SHA256:
128726C75E618FE31DE0FDB1644038A2E3EF04F5899D6B0E55BA6805BCAFCD2A
File Size:
140.80 KB, 140800 bytes
|
|
MD5:
8cc3eb7cd62f27880c95dbf4d6ba2bcd
SHA1:
1d2158ad77970828d1a474521bf71bc038b208c2
SHA256:
95470D2969B6C2C58C8DAD715E2C7EBD4E85412D1BFD1E4BE0E35584170B6081
File Size:
145.41 KB, 145408 bytes
|
|
MD5:
5100d30e6db8637494274d94fdfb39e3
SHA1:
f6f8909b8eda45ce5638dbb1a1c68e2749aae38f
SHA256:
EACDBAC6360C7230AA42DC5C6996E09DD574E6FF6B7FC2D1A97846C574FB7535
File Size:
164.86 KB, 164864 bytes
|
|
MD5:
9b2f5a420b26d57616b4637e151894ef
SHA1:
de31bba01359ae13f7912ee6b45433fb81c666b9
SHA256:
AAA5146F29077A76E769BAB64F164F14DE220723491DB5974BFB68AFAD9568BB
File Size:
79.36 KB, 79360 bytes
|
|
MD5:
a012551a2df16c2f73ad782b48aada36
SHA1:
c2062bb035c4fff7bb79b4e18fe60dfc641ea043
SHA256:
D1479BCF914D3FDA685267260C997673F19D415632158338F061E560AB33DFEA
File Size:
79.87 KB, 79872 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have exports table
- File doesn't have security information
- File is 32-bit executable
- File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
- File is either console or GUI application
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Traits
- 2+ executable sections
- JMC
- No Version Info
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 235 |
|---|---|
| Potentially Malicious Blocks: | 2 |
| Whitelisted Blocks: | 217 |
| Unknown Blocks: | 16 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- CobaltStrike.UA
- CsgoHack.GAI
- CsgoHack.GC
- Injector.DFD
- Injector.FH
Show More
- Injector.KNE
- Injector.RAA
- MinecraftHack.D
- Trojan.Kryptik.Gen.AZP