Threat Database Stealers Trojan.MSIL.Stealer.OG

Trojan.MSIL.Stealer.OG

By CagedTech in Stealers, Trojans

Threat Scorecard

Popularity Rank: 29,054
Threat Level: 80 % (High)
Infected Computers: 1
First Seen: July 9, 2024
Last Seen: January 15, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.MSIL.Stealer.OG
Signature status: No Signature

Known Samples

MD5: 6e0a9257eaf6e3585328e2cce6c4434b
SHA1: 6223f1c4df6a1e9fbd8fd17ab3fa51a9355a3540
SHA256: EC3FEA4E00EB0A4712A869B52EACCE7EFBCDCC9B958B8F46066E6F8969C4F79C
File Size: 16.38 KB, 16384 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have security information
  • File is .NET application
  • File is 32-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Assembly Version 1.0.0.0
File Description SharpCookieMonster
File Version 1.0.0.0
Internal Name SharpCookieMonster.exe
Legal Copyright Copyright © 2020
Original Filename SharpCookieMonster.exe
Product Name SharpCookieMonster
Product Version 1.0.0.0

File Traits

  • .NET
  • x86

Block Information

Total Blocks: 10
Potentially Malicious Blocks: 7
Whitelisted Blocks: 3
Unknown Blocks: 0

Visual Map

x x x x x x 0 0 0 x
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • MSIL.Stealer.OG

Files Modified

File Attributes
\device\namedpipe Generic Read,Write Attributes
\device\namedpipe Generic Write,Read Attributes

Windows API Usage

Category API
User Data Access
  • GetComputerNameEx
  • GetUserDefaultLocaleName
  • GetUserObjectInformation
Other Suspicious
  • AdjustTokenPrivileges
Anti Debug
  • NtQuerySystemInformation
Process Shell Execute
  • CreateProcess

Shell Command Execution

"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" "https://www.google.com" --headless --user-data-dir="C:\Users\Uczqmiag\AppData\Local\Google\Chrome\User Data" --remote-debugging-port=9142

Trending

Most Viewed

Loading...