Threat Database Stealers Trojan.MSIL.Stealer.O

Trojan.MSIL.Stealer.O

By CagedTech in Stealers, Trojans

Threat Scorecard

Popularity Rank: 24,113
Threat Level: 80 % (High)
Infected Computers: 156
First Seen: January 23, 2022
Last Seen: December 9, 2025
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.MSIL.Stealer.O
Signature status: No Signature

Known Samples

MD5: e21042c4111b227612f55038ad5ae04a
SHA1: 28eac8e9fa940e15e694fa7d1db52fd518e24d39
SHA256: 739BFD592C18B4D7BCC351593BE45E7653F64C2573AB681DA36B9CAAA78B83DC
File Size: 929.28 KB, 929280 bytes
MD5: e1c64fd88f92bfa55a584378d968874f
SHA1: e85999ee9ee69daaf4701d671b5574e06dfff015
SHA256: 1E61DD97C45E014EBB6ECDE6E5F55C615F76CE0ACA1D1572CA03857900582F28
File Size: 929.28 KB, 929280 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have security information
  • File is .NET application
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Assembly Version 1.0.0.0
Company Name Microsoft Corporation
File Description Host Process for Windows Services
File Version 6.2.19041.0
Internal Name svchost.exe
Legal Copyright © Microsoft Corporation. All rights reserved.
Original Filename Orcus.exe
Product Name Microsoft® Windows® Operating System
Product Version 10.0.19041.0

File Traits

  • .NET
  • Agile.net
  • Fody
  • HighEntropy
  • ntdll
  • RijndaelManaged
  • Run
  • x86

Block Information

Total Blocks: 1,236
Potentially Malicious Blocks: 752
Whitelisted Blocks: 484
Unknown Blocks: 0

Visual Map

0 0 0 x x 0 x 0 0 0 0 x 0 x x x x x x x x x 0 x x x x x x x x 0 x 0 x x x x 0 x x 0 0 0 0 x 0 0 0 0 x 0 x x x x 0 x x x 0 x 0 0 x x x 0 x x x x x x x 0 0 0 0 0 x x x 0 0 0 0 x 0 0 0 0 0 x x 0 0 x x 0 x x x x x 0 0 0 0 0 0 0 0 0 x 0 0 0 x x x 0 0 0 x x x x 0 x 0 x x x x x x x x x x x 0 0 x x 0 0 0 x x x 0 x 0 0 x 0 0 x x 0 0 0 0 x 0 0 0 0 0 0 0 0 x x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x x x x x x 0 0 0 0 x x x x x x 0 0 x x 0 x x x x x 0 0 x 0 0 x 0 0 0 0 x x x x x x 0 x x x x x x 0 x x x 0 x x x 0 0 0 0 0 0 0 0 x x x x x x x x 0 x 0 0 0 x x 0 x x 0 0 x x x x x 0 x x x 0 x x x 0 0 0 0 0 0 0 0 x 0 x 0 x 0 x 0 x 0 x x 0 0 x 0 x x x 0 x x x x 0 0 0 x x x x x 0 0 0 x x 0 x 0 x x x x 0 x 0 0 x x 0 0 0 x 0 x 0 x 0 0 0 x x x 0 0 0 0 x 0 0 0 0 0 0 0 0 0 x x 0 0 x x 0 x x x x x 0 0 0 0 x x x x x 0 0 0 0 x x x x x x 0 x x x x x 0 x 0 0 x x x x x x 0 x x x x x x x x x x x 0 0 0 x 0 x 0 x x x x 0 0 0 0 x x x x x x 0 x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x x x x 0 x 0 0 x 0 0 x x x x x x 0 x x x x x 0 x x 0 0 0 x 0 0 0 x 0 0 0 0 0 0 x 0 x 0 x 0 x x 0 0 x x x x x 0 x x x x x 0 x x x x x x 0 0 0 0 0 0 0 0 x x x x 0 x x x x x x x x x x 0 x x x x 0 x x x x x x x x x x x x x 0 x x x x x 0 x x x x 0 x x x x 0 0 0 x x x x x x x x x x x x x x 0 x x x x x x x x x x x x x x x x x 0 x x x 0 x x x 0 0 0 x 0 x x x x x x 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 x 0 0 0 0 x 0 0 x 0 0 x 0 0 0 0 x x 0 x 0 x 0 0 0 0 x 0 0 0 0 0 0 x x x 0 x 0 x x x x x x 0 x 0 x 0 x 0 x 0 0 x 0 x x x 0 0 0 0 x 0 x x 0 0 0 0 0 0 x x x x x x x x x x 0 0 0 0 0 x 0 x x x x x x x x x x x x x x x x x x 0 x x x x x x x x x 0 x x x x 0 x x x x 0 x 0 x x x x x 0 x 0 0 x x x x 0 0 0 x x x 0 x x x x x x 0 0 x x x x 0 x 0 0 x x 0 x x 0 0 x x x x x x x x x 0 x 0 x x 0 0 x 0 x x x 0 x x x x x x x x x 0 x x x x 0 0 0 0 0 x 0 0 x x x x x x 0 x x x x x x x x x 0 0 x x x x 0 0 x 0 0 0 0 x 0 0 0 x 0 0 x x x x x 0 x x x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 x x x x 0 0 x 0 0 x 0 x 0 x x 0 x 0 x x 0 0 x x x x x x 0 0 x 0 x 0 x x x x 0 x x x x 0 0 0 0 0 x x 0 0 0 0 0 x 0 0 0 x x x x x x x x x x 0 x x x x x x x x x 0 0 0 x x x x x 0 x x x x x x x x x x 0 0 0 0 0 x x x x x x x x x x x x x x x 0 x x x x x x x x x x 0 x x x x x x 0 0 0 x x x x x 0 x x 0 x 0 x x 0 x x x 0 0 0 0 0 x x 0 x 0 x x x 0 0 x x 0 0 0 x x x x 0 x x 0 0 0 0 x x x x x x x x x x 0 x x x 0 0 0 0 0 0 0 0 x 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • MSIL.Stealer.O

Files Modified

File Attributes
c:\program files (x86)\system\svchost.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\program files (x86)\system\svchost.exe Synchronize,Write Attributes
c:\program files (x86)\system\svchost.exe.config Generic Write,Read Attributes
c:\users\user\appdata\local\temp\ebrcvmy4.0.cs Generic Write,Read Attributes
c:\users\user\appdata\local\temp\ebrcvmy4.cmdline Generic Write,Read Attributes
c:\users\user\appdata\local\temp\ebrcvmy4.dll Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\ebrcvmy4.err Generic Write,Read Attributes
c:\users\user\appdata\local\temp\ebrcvmy4.out Generic Write,Read Attributes
c:\users\user\appdata\local\temp\ebrcvmy4.tmp Generic Write,Read Attributes
c:\windows\assembly Synchronize,Write Attributes

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAccessCheck
  • ntdll.dll!NtAddAtomEx
  • ntdll.dll!NtAlertThreadByThreadId
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtClearEvent
  • ntdll.dll!NtClose
  • ntdll.dll!NtConnectPort
  • ntdll.dll!NtCreateEvent
  • ntdll.dll!NtCreateFile
Show More
  • ntdll.dll!NtCreateKey
  • ntdll.dll!NtCreateMutant
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtCreateSemaphore
  • ntdll.dll!NtDeviceIoControlFile
  • ntdll.dll!NtDuplicateObject
  • ntdll.dll!NtDuplicateToken
  • ntdll.dll!NtEnumerateKey
  • ntdll.dll!NtEnumerateValueKey
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenEvent
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenProcessTokenEx
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenSemaphore
  • ntdll.dll!NtOpenThreadToken
  • ntdll.dll!NtOpenThreadTokenEx
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryDefaultLocale
  • ntdll.dll!NtQueryDirectoryFileEx
  • ntdll.dll!NtQueryFullAttributesFile
  • ntdll.dll!NtQueryInformationFile
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQuerySystemInformation
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtQueryWnfStateData
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtReleaseMutant
  • ntdll.dll!NtReleaseSemaphore
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtRequestWaitReplyPort
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationKey
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationThread
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSubscribeWnfStateChange
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtUnmapViewOfSectionEx
  • ntdll.dll!NtWaitForAlertByThreadId
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWorkerFactoryWorkerReady
  • ntdll.dll!NtWriteFile
  • ntdll.dll!NtWriteVirtualMemory
  • UNKNOWN
  • win32u.dll!NtGdiAnyLinkedFonts
  • win32u.dll!NtGdiBitBlt
  • win32u.dll!NtGdiCreateBitmap
  • win32u.dll!NtGdiCreateCompatibleBitmap
  • win32u.dll!NtGdiCreateCompatibleDC
  • win32u.dll!NtGdiCreateDIBitmapInternal
  • win32u.dll!NtGdiCreateRectRgn
  • win32u.dll!NtGdiCreateSolidBrush
  • win32u.dll!NtGdiDeleteObjectApp
  • win32u.dll!NtGdiDoPalette
  • win32u.dll!NtGdiDrawStream
  • win32u.dll!NtGdiExtGetObjectW
  • win32u.dll!NtGdiExtTextOutW
  • win32u.dll!NtGdiFontIsLinked
  • win32u.dll!NtGdiGetCharABCWidthsW
  • win32u.dll!NtGdiGetDCDword
  • win32u.dll!NtGdiGetDCObject
  • win32u.dll!NtGdiGetDeviceCaps
  • win32u.dll!NtGdiGetDIBitsInternal
  • win32u.dll!NtGdiGetEntry
  • win32u.dll!NtGdiGetFontData
  • win32u.dll!NtGdiGetGlyphIndicesW
  • win32u.dll!NtGdiGetOutlineTextMetricsInternalW
  • win32u.dll!NtGdiGetRandomRgn
  • win32u.dll!NtGdiGetRealizationInfo
  • win32u.dll!NtGdiGetTextFaceW
  • win32u.dll!NtGdiGetTextMetricsW
  • win32u.dll!NtGdiGetWidthTable
  • win32u.dll!NtGdiHfontCreate

65 additional items are not displayed above.

User Data Access
  • GetComputerNameEx
  • GetUserDefaultLocaleName
  • GetUserObjectInformation
Anti Debug
  • IsDebuggerPresent
  • NtQuerySystemInformation
Encryption Used
  • BCryptOpenAlgorithmProvider
  • CryptAcquireContext
Process Shell Execute
  • CreateProcess
Process Terminate
  • TerminateProcess

Shell Command Execution

"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Anjfjoue\AppData\Local\Temp\ebrcvmy4.cmdline"

Trending

Most Viewed

Loading...