Threat Database Hacktool Hacktool.MSIL.TelegramHack.S

Hacktool.MSIL.TelegramHack.S

By CagedTech in Hacktool

Threat Scorecard

Popularity Rank: 25,676
Threat Level: 50 % (Medium)
Infected Computers: 4
First Seen: December 17, 2023
Last Seen: November 26, 2025
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Hacktool.MSIL.TelegramHack.S
Signature status: No Signature

Known Samples

MD5: 26a5781e02de13f4ec1f4bc525059ad8
SHA1: 10126a1d99d654cfd89be2990f0b90ae3b0d859f
SHA256: 6DF22F402FE1037094B6394976A6273E58B945E1715EB66E69F2351CCE87E745
File Size: 8.19 KB, 8192 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have security information
  • File is .NET application
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Assembly Version 0.0.0.0
File Version 0.0.0.0
Internal Name kamwizi.exe
Original Filename kamwizi.exe
Product Version 0.0.0.0

File Traits

  • .NET
  • x86

Block Information

Total Blocks: 10
Potentially Malicious Blocks: 8
Whitelisted Blocks: 2
Unknown Blocks: 0

Visual Map

0 x x x x x x x x 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • MSIL.Spy.Agent.AH
  • MSIL.TelegramHack.S

Windows API Usage

Category API
User Data Access
  • GetComputerNameEx
  • GetUserDefaultLocaleName
  • GetUserObjectInformation
Anti Debug
  • IsDebuggerPresent
  • NtQuerySystemInformation
Process Manipulation Evasion
  • ReadProcessMemory

Trending

Most Viewed

Loading...