Trojan.MSIL.Clicker.CCC
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.MSIL.Clicker.CCC |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
16896b10753ea1e316a48d7361ee6393
SHA1:
d70d8adbcc6c29c6cfa121a89835f558ece9ed47
SHA256:
5FB02A5818B0774414B3F3C6C17C619AAD6518D97ED391209BDF3E62B11A6DD9
File Size:
18.43 KB, 18432 bytes
|
|
MD5:
eb00dac7aacbcc2d1b817442bbd91b10
SHA1:
b56d906e7e647760c955af061f595c164d621179
SHA256:
C9EB359EC7E0E8F6322942A88EC8D58CC7F7777B7F5A872B2DB888AD1FA90A46
File Size:
18.94 KB, 18944 bytes
|
|
MD5:
d03b7bd2ef87ce7ae403d1f66f435a03
SHA1:
a7ddf4043db066f4cbdcc92ed99aba74d5a43fb0
SHA256:
79E763BF24F36F83F696B8A69635DE50C263C6EEC95E9CD22C1FCEE70AFC46BD
File Size:
18.94 KB, 18944 bytes
|
|
MD5:
3ee279379c1e41085e75909755a1a925
SHA1:
e27e86257ccc8aee6f2b02a309622eddc0d46d63
SHA256:
C7036066159B0AF317CE776AF0BEA15587BA38A0615014125E5D6EC364DBB56D
File Size:
18.94 KB, 18944 bytes
|
|
MD5:
ee67c2e28cdfb6f62e6775de176077ff
SHA1:
3cb63f0a0ce5861718160170149a92621ac9f352
SHA256:
208C99EB93E23E31B4B9CB96A4F90F2A9FA33582CE7A7F054CAFB506C39F80AD
File Size:
18.43 KB, 18432 bytes
|
Show More
|
MD5:
69aeee124513ac567052614e4fdb62d0
SHA1:
4fecf85e560c7c31cb0753ca97d717a5e69b6907
SHA256:
D6D66BF29F694D0600E405DB8B447427E566C1300B010F95D6A54A1A4A87C965
File Size:
17.92 KB, 17920 bytes
|
|
MD5:
e2247705076409bd8d42f74d8f0a3dbd
SHA1:
61e1c1987d05884316b70baa6a67aad7ab7cb4bc
SHA256:
81DE809784EDBE9CDD55B584D524E06E92FE07EAA8B184C2968836080FA22A71
File Size:
18.43 KB, 18432 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have exports table
- File doesn't have security information
- File is .NET application
- File is 32-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Assembly Version | 1.0.0.0 |
| Comments |
|
| Company Name |
|
| File Description |
|
| File Version | 1.0.0.0 |
| Internal Name |
|
| Legal Copyright | Copyright © 2025 |
| Original Filename |
|
| Product Name |
|
| Product Version | 1.0.0.0 |
File Traits
- .NET
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 41 |
|---|---|
| Potentially Malicious Blocks: | 16 |
| Whitelisted Blocks: | 20 |
| Unknown Blocks: | 5 |
Visual Map
x
x
x
?
x
0
0
x
x
x
x
0
0
x
?
0
?
0
0
0
?
0
0
0
0
x
x
0
0
x
0
0
x
x
x
0
0
x
0
?
0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block
? - Unknown Block
x - Potentially Malicious Block
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
|
| User Data Access |
|