Threat Database Trojans Trojan.MSIL.BypassUAC.LC

Trojan.MSIL.BypassUAC.LC

By CagedTech in Trojans

Analysis Report

General information

Family Name: Trojan.MSIL.BypassUAC.LC
Signature status: No Signature

Known Samples

MD5: 50340a6e97d8b15506827198a303bd2b
SHA1: f6f9b2cf0c8bf045998101612fc0b21a13f33505
SHA256: 93D17BA759C4DE2E390CE58D893BF11A90A5FD13E088928C943822C34C04069F
File Size: 11.26 KB, 11264 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have security information
  • File is .NET application
  • File is 32-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Assembly Version 1.0.0.0
File Description persistent2.0
File Version 1.0.0.0
Internal Name persistent2.0.exe
Legal Copyright Copyright © 2025
Original Filename persistent2.0.exe
Product Name persistent2.0
Product Version 1.0.0.0

File Traits

  • .NET
  • x86

Block Information

Total Blocks: 17
Potentially Malicious Blocks: 1
Whitelisted Blocks: 16
Unknown Blocks: 0

Visual Map

0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • MSIL.Agent.FSDA
  • MSIL.BypassUAC.K
  • MSIL.BypassUAC.LC
  • MSIL.Inject.YT

Files Modified

File Attributes
c:\users\public\seguridad_windows1212.vbs Generic Write,Read Attributes
c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\windows.vbs Generic Write,Read Attributes

Windows API Usage

Category API
User Data Access
  • GetUserDefaultLocaleName
  • GetUserObjectInformation

Trending

Most Viewed

Loading...