Threat Database Trojans Trojan.MSIL.FakeHack.E

Trojan.MSIL.FakeHack.E

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 9,824
Threat Level: 80 % (High)
Infected Computers: 316
First Seen: September 17, 2021
Last Seen: October 4, 2025
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.MSIL.FakeHack.E
Signature status: No Signature

Known Samples

MD5: e76b44bb9df810790cde1bd5ab5e31f6
SHA1: 57cf7a1f9029bbca6ccefc1b6703e77184ac2081
SHA256: 66643A7F342BE10C2957623AC877E85093D5F9B01719ED795C9F3FD971BB1856
File Size: 802.52 KB, 802520 bytes
MD5: d1414259ef11e237a2105f70b4737462
SHA1: 443089b27d39872e779eab01a8d3ef9ac2ef1c1d
SHA256: E5C649358BCEA1AB21C8D560226EF2F6E7A71817C3F1CDDD001619FB130D9E7C
File Size: 883.20 KB, 883200 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have security information
  • File is .NET application
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Assembly Version 1.0.0.0
File Description
  • JSONtoCSM
  • WinFormDesigner
File Version 1.0.0.0
Internal Name
  • JSONtoCSM.exe
  • WinFormDesigner.exe
Legal Copyright
  • Copyright © 2022
  • Copyright © 2024
Original Filename
  • JSONtoCSM.exe
  • WinFormDesigner.exe
Product Name
  • JSONtoCSM
  • WinFormDesigner
Product Version 1.0.0.0

Digital Signatures

Signer Root Status
Ironman Software LLC GlobalSign GCC R45 CodeSigning CA 2020 Self Signed

File Traits

  • .NET
  • Agile.net
  • Fody
  • HighEntropy
  • x86

Block Information

Total Blocks: 28
Potentially Malicious Blocks: 0
Whitelisted Blocks: 23
Unknown Blocks: 5

Visual Map

0 0 0 0 0 0 ? 0 ? ? ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Windows API Usage

Category API
User Data Access
  • GetUserDefaultLocaleName
  • GetUserObjectInformation
Anti Debug
  • IsDebuggerPresent
  • NtQuerySystemInformation
Encryption Used
  • BCryptOpenAlgorithmProvider

Trending

Most Viewed

Loading...