Trojan.MSIL.ClipBanker.BB
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 10,164 |
| Threat Level: | 80 % (High) |
| Infected Computers: | 241 |
| First Seen: | February 27, 2023 |
| Last Seen: | April 12, 2026 |
| OS(es) Affected: | Windows |
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.MSIL.ClipBanker.BB |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
dff9741ab0777e32bc19ed1d66565434
SHA1:
f4a04237b79da3afa77ba49e47c3aa9f4d3f8873
SHA256:
4872C4B6DC1E2BD52D15F52A9F3F6F65921E43A3754D7DD21CBFEC1EDB8DEB4D
File Size:
549.89 KB, 549888 bytes
|
|
MD5:
007ea2442c4002716fcb19e03c2945c9
SHA1:
2ea598e8a9bc82beacf63b83ee2091f52d58038f
SHA256:
1C3846F45D23BEE08ACA35B3EFB3FE663376EBCE327E5029D640B80F2A70BB99
File Size:
757.43 KB, 757431 bytes
|
|
MD5:
73213c3ab43997b64cfa172de76bfa46
SHA1:
e7690110b019c618f6bebcd6dd25b7e77ea9e9e4
SHA256:
B4B66A5D4F6A794111EB709E25F3CA826D06EE3D804C1F26008A822A14F27891
File Size:
2.09 MB, 2090496 bytes
|
|
MD5:
2c02b45b886b1cb476458dbc266e4a60
SHA1:
05f8777e5926b0b3c697c5fb881d97b713cbe05e
SHA256:
5F5A46BE1A90FEDB5D8E2390B56C723D228EFFFFAE7D8E8DEEBF8DD2022DBD4C
File Size:
889.86 KB, 889856 bytes
|
|
MD5:
4411a8b8d16b72a0089bf8ed811b9fa6
SHA1:
cb76bf23aecff2d690b5248c2718e09537514e50
SHA256:
8E8B7329C9B3DF419A196D7CA9D4E44F94A5F7AAADC917886F47E46A96CEEDE9
File Size:
2.37 MB, 2374656 bytes
|
Show More
|
MD5:
ff53f289f3a2a62eecf5230ddfdb8f73
SHA1:
a34496b3dcb3fb8e3fe3bd659b1b0fe9b34e94c6
SHA256:
2F3FE6BEA9EC99752CC70279A71BBA45816BF4B4D485DACBEB3A35533C86996F
File Size:
1.35 MB, 1346143 bytes
|
|
MD5:
24454f1a6ed2ebc1a827599a92bb44b9
SHA1:
3f530cecb28ec2834e624ba6c7e99fdb141fb308
SHA256:
B739578839BD092A164ADC44A043DDAAE5B9F2F62300BF6B09639AA0CC4DAA62
File Size:
478.21 KB, 478208 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File is .NET application
- File is 32-bit executable
- File is 64-bit executable
- File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
- File is either console or GUI application
Show More
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Assembly Version |
|
| Comments | Aftermarket Programming E8 |
| Company Name |
|
| File Description |
|
| File Version |
|
| Internal Name |
|
| Legal Copyright |
|
| Original Filename |
|
| Product Name |
|
| Product Version |
|
File Traits
- .NET
- 2+ executable sections
- HighEntropy
- ntdll
- RijndaelManaged
- vmp section variant
- x64
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 604 |
|---|---|
| Potentially Malicious Blocks: | 21 |
| Whitelisted Blocks: | 288 |
| Unknown Blocks: | 295 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| c:\windows\system32\drivers\etc\hosts | Generic Write,Read Attributes |
| c:\windows\system32\drivers\etc\hosts | Synchronize,Write Attributes |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKLM\software\microsoft\tracing\rasapi32::enablefiletracing | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasapi32::enableautofiletracing | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasapi32::enableconsoletracing | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasapi32::filetracingmask | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasapi32::consoletracingmask | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasapi32::maxfilesize | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasapi32::filedirectory | %windir%\tracing | RegNtPreCreateKey |
| HKLM\software\microsoft\tracing\rasmancs::enablefiletracing | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasmancs::enableautofiletracing | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasmancs::enableconsoletracing | RegNtPreCreateKey |
Show More
| HKLM\software\microsoft\tracing\rasmancs::filetracingmask | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasmancs::consoletracingmask | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasmancs::maxfilesize | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasmancs::filedirectory | %windir%\tracing | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
7 additional items are not displayed above. |
| User Data Access |
|
| Network Winsock2 |
|
| Network Winsock |
|
| Network Info Queried |
|
| Other Suspicious |
|
| Network Winhttp |
|
| Anti Debug |
|