Threat Database Trojans Trojan.MSIL.HackAgent.E

Trojan.MSIL.HackAgent.E

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 15,271
Threat Level: 80 % (High)
Infected Computers: 4,919
First Seen: October 6, 2021
Last Seen: May 3, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.MSIL.HackAgent.E
Signature status: No Signature

Known Samples

MD5: 6ebee70fcc3b120b42d841dd44b851f9
SHA1: 9a69ac02dc76b36436165d26eac74fe8843596cf
SHA256: 17B6EE5A676955AFA8185D749FA8DA535355DB40C87CD50145A3CA257F81F078
File Size: 725.52 KB, 725520 bytes
MD5: 9530ce73891116cd5070185ea085de30
SHA1: eafcc7650239921050c87bb120b9cee6d18e1ed5
SHA256: C5D35B9FA8D38BA26A553AF71682499494EDEE1BFF13E5533E0E66424D2AE8D8
File Size: 1.01 MB, 1014800 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have security information
  • File is .NET application
  • File is 32-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Assembly Version 1.0.0.0
File Description
  • lofyfree
  • LU Team - Fake Reset Utility
File Version 1.0.0.0
Internal Name
  • lofyfree.exe
  • LU Team - Fake Reset Utility.exe
Legal Copyright
  • Copyright © 2025
  • Copyright © 2026
Original Filename
  • lofyfree.exe
  • LU Team - Fake Reset Utility.exe
Product Name
  • lofyfree
  • LU Team - Fake Reset Utility
Product Version 1.0.0.0

File Traits

  • .NET
  • Agile.net
  • Fody
  • HighEntropy
  • ntdll
  • WriteProcessMemory
  • x86

Block Information

Total Blocks: 268
Potentially Malicious Blocks: 152
Whitelisted Blocks: 100
Unknown Blocks: 16

Visual Map

x 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 x x 0 x 0 0 0 0 0 0 0 0 0 0 x x 0 0 x 0 0 x x 0 0 0 0 0 0 ? ? ? x x x x x 0 0 x 0 0 ? 0 ? 0 x x ? ? ? ? ? 0 ? x 0 0 0 ? 0 x 0 0 0 0 ? 0 x x x 0 ? x x x x x x ? x x x x 0 x x x x x x x 0 0 x x x x x x x x x x x x x x x x x x x x x x x 0 0 x x x x x 0 0 x 0 0 0 0 x x x x x x x x x x x x x x x x x x x 0 x 0 0 x x x x 0 0 x x x 0 x x x x 0 0 x 0 x x x x x x x x x x x x 0 x x 0 0 x x 0 0 0 0 x x x x x x x x x x x 0 x x x x x x x x x 0 x x x x x 0 0 ? x x x 0 x x 0 0 0 x x
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • MSIL.HackAgent.E

Windows API Usage

Category API
User Data Access
  • GetComputerName
  • GetComputerNameEx
  • GetUserDefaultLocaleName
  • GetUserObjectInformation
Anti Debug
  • IsDebuggerPresent
  • NtQuerySystemInformation
Other Suspicious
  • AdjustTokenPrivileges
Encryption Used
  • BCryptOpenAlgorithmProvider

Trending

Most Viewed

Loading...