Threat Database Trojans Trojan.Kryptik.BRGCD

Trojan.Kryptik.BRGCD

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 21,096
Threat Level: 80 % (High)
Infected Computers: 969
First Seen: January 5, 2023
Last Seen: January 14, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.Kryptik.BRGCD
Signature status: Hash Mismatch

Known Samples

MD5: a56d30a3c68e9c167cdbd53b18c1bc6c
SHA1: 2c27a96ce90bce8aa654f4bd0c9d93530422a20c
SHA256: A738ADBB5C5A385178F5EE0CD0BF5B5AA51B190350DA70D58AB9F2217692E7C9
File Size: 3.61 MB, 3606280 bytes
MD5: 7a5e3a6f3bc4ae534ef1787d3c58e814
SHA1: 0c8b1b1c268fe34f4baec0b3748b576e359f55c1
SHA256: B1C3B2A9DB42CF08D7E9CDC110DF56E8A1A5D013489916D4568618AFD248EF2A
File Size: 222.20 KB, 222200 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File is 32-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Comments
  • Horrifying buggered pros interspersing businessmen
  • Modified by an unpaid evaluation copy of Resource Tuner 2. http://www.heaventools.com
Company Name
  • Giants telephonists
  • Hillock streaking
File Description
  • Constituted atlas unbuttoned
  • Falsebay toleration presupposition cuddled hermaphrodite lenders
File Version
  • 8.258.196.5
  • 3.45.134.8
Internal Name
  • Odometer vacuous
  • Prunes surpassed
Legal Copyright
  • Copyright © Shelved liquid
  • Copyright © Buffered officialness stuffing feathered unsought unguided
Legal Trademarks Detachable novelist cairo charioteers overshot faults
Original Filename Panda designating
Product Name
  • Simmered
  • Understate
Product Version
  • 8.258.196.5
  • 3.45.134.8

Digital Signatures

Signer Root Status
Adobe Inc. DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1 Hash Mismatch
Razer USA Ltd. DigiCert Trusted Root G4 Hash Mismatch

File Traits

  • HighEntropy
  • x86

Block Information

Total Blocks: 238
Potentially Malicious Blocks: 8
Whitelisted Blocks: 230
Unknown Blocks: 0

Visual Map

x x x x x x x x 2 0 0 0 0 1 1 2 0 0 1 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 2 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 3 0 0 0 0 0 1 1 0 1 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 1 1 1 0 0 1 0 0 0 2 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 2 2 0 0 1 0 0 0 1 1 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 1 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 1 0 0 2 0 0 1
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
c:\programdata\dllhost Synchronize,Write Attributes
c:\users\user\appdata\local\microsoft\windows\usrclass.dat{dba6b5ef-640a-11ed-9bcb-f677369d361c}.txr.0.regtrans-ms Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\microsoft\windows\usrclass.dat{dba6b5ef-640a-11ed-9bcb-f677369d361c}.txr.1.regtrans-ms Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\microsoft\windows\usrclass.dat{dba6b5ef-640a-11ed-9bcb-f677369d361c}.txr.2.regtrans-ms Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\microsoft\windows\usrclass.dat{dba6b5ef-640a-11ed-9bcb-f677369d361c}.txr.blf Generic Read,Write Data,Write Attributes,Write extended,Append data

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection

Trending

Most Viewed

Loading...