Trojan.Kryptik.Gen.DBQ
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 3,791 |
| Threat Level: | 80 % (High) |
| Infected Computers: | 64 |
| First Seen: | February 10, 2026 |
| Last Seen: | May 20, 2026 |
| OS(es) Affected: | Windows |
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.Kryptik.Gen.DBQ |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
b054cb025c67eb1e27b984f52a191917
SHA1:
0e95e6d574b84da4473dc2cbe39cf46f9b03e0fa
SHA256:
02FF23A4D5CA9E19B1D6D34BF05E26E1E52834D49C9B342049331D6C161484F4
File Size:
605.92 KB, 605918 bytes
|
|
MD5:
451beaf87986ef52605d3a99bd7a6b23
SHA1:
7c991dc2ab2ee41bb0084ec79a8d31fad2fd7d1d
SHA256:
331E592CF7FABAE31508D6EFD7CF9D2F3458F10085BEFA8D59E8A3993EA80E43
File Size:
2.73 MB, 2734937 bytes
|
|
MD5:
250ad250af353f31b6c662bd671f2783
SHA1:
548a8defbaf1e3474fa3db69c7268294f6d8895f
SHA256:
54FF42709F0D9FC94F65FE8D7F1288587966DABAE136F9D5C6EC3ED3E9834D34
File Size:
1.81 MB, 1814928 bytes
|
|
MD5:
87a87134832dc6bd910a2fdf92ed3a73
SHA1:
0d40f7f81b57243850066185b788242974455536
SHA256:
13D2B6D339946665271581A8D8FED954535F6B3405FB82BBB5614491F7A25DB4
File Size:
1.61 MB, 1614760 bytes
|
|
MD5:
d833ddd42217849d90418f18e406168b
SHA1:
86b175502337a5a8f5bca48091f5ad6e03b2939a
SHA256:
B877F3EF3A5F6941AB8A732CAEAF21FA80A8818814382AA3EC49FD9A6128B45B
File Size:
1.82 MB, 1816484 bytes
|
Show More
|
MD5:
285292d86f774302853af0e93a2353c2
SHA1:
2af7161fd492aae8ebc41945a1fa9004960cf0ec
SHA256:
52EDDCFE0DD3093B6D66CEBBD420480846E0AC79C422D88137A1A96AA34FE894
File Size:
1.59 MB, 1593032 bytes
|
|
MD5:
cac62732830cf65e8578a50a3fc1114b
SHA1:
1c8eb481822afc8dcb7c84b39ed07d08d5eac737
SHA256:
FB209B43468810B910846E2520E98DFF84074F60C038362C61A1FD5E92B81834
File Size:
3.41 MB, 3412072 bytes
|
|
MD5:
431fd1c2e9e89b58e66ad3ec449f25b8
SHA1:
0afb05de7a6f402605f3dbf8ca5c9a6a378c0e95
SHA256:
BBFE9320BC5247DF59E1FB651428D2CA9E5A90105D4473DE73E75CD0A56BE5AC
File Size:
3.40 MB, 3403540 bytes
|
|
MD5:
8d91a5287d842fc54a20b43abe4f42cd
SHA1:
f9c01a81c780f1d3a9c33925235ef2f5735c2b11
SHA256:
C140527D5665214300EBD20CF46CA1F9DA97303971204B01A9A22784F6D662AE
File Size:
1.12 MB, 1115720 bytes
|
|
MD5:
805d16ce8bd7bc6a0eb05cfc9d933f20
SHA1:
a1b9d4a5e5f402f8c9ee41c0f30181b902dcdb5f
SHA256:
E25613EDC204FEC0E3B94D942D003A0EEB656DC365664AE5E377A721416598F7
File Size:
1.10 MB, 1100728 bytes
|
|
MD5:
d3e92da9c7fb8fa6c5c23fd8fdc73872
SHA1:
630de320379240f4a4f0382fb55e21d85c2e53ef
SHA256:
CB199DB146FB7FD5B31C7B2C05F29E163EE807DE60CCAA517F5DC5DDF6B37093
File Size:
1.08 MB, 1084000 bytes
|
|
MD5:
0f1d74715336395ab592576d66df7003
SHA1:
cacf1bf6b1d494d849dfdad1a1cd9b99b9b56705
SHA256:
8276E230DABEC99FDC6AD74F56E09196A0B5B454459A76F7B6FEE24BC7928294
File Size:
1.08 MB, 1078920 bytes
|
|
MD5:
448788199244eb82b8eb561094fc3e35
SHA1:
ff34f7f0769db10347776208df06718b9bdb3765
SHA256:
0625D020AE31CA641D5C5968ED0D36C5ABA6474DC70C57237D84046C7A8001A3
File Size:
1.08 MB, 1084520 bytes
|
|
MD5:
73ef1432675addd0cb60676672e34da9
SHA1:
8c2d7c45ad02186e9dda43e1cd88b79ab132a549
SHA256:
7962A5EE5F758C36B5B9095F26681D64C068C06A8A0A67E47A7BC8E2DA5769A8
File Size:
1.08 MB, 1083572 bytes
|
|
MD5:
02f2aab7072018656093074b754278bf
SHA1:
1d30452028a111831dc361d363f56c060188e4b2
SHA256:
EFDB7108BCBBD9D5D930A006AAA75A256D147D51A2D6DDBCE84D74525F617D7E
File Size:
1.11 MB, 1109744 bytes
|
|
MD5:
d06c23047c0da2dadf2a10ef36d27047
SHA1:
60e4444fdb9d32abcdc54f0e5355bd7e45db02c9
SHA256:
73FF03B2B1B39AB61D33024E5727546FF3B10204431C7B930565C025C3937247
File Size:
1.10 MB, 1101572 bytes
|
|
MD5:
07c2cbda2f819a716908b32e770408d6
SHA1:
5ee7d48a24cdb1db6277f545db8bb3ec27e2015c
SHA256:
C37FA714409625C264773F135B84F251F3963A1EA1DFA5C2A2729EBC7DD5D3C3
File Size:
1.14 MB, 1135108 bytes
|
|
MD5:
50390b94cd5a9bc02b0389a9fead6ce0
SHA1:
6524af1cfa99cb211bc10e0dc30eb22603ed1b4e
SHA256:
8DD93DBD95CE01A350539803C95C41742F7441F79FFC19632409D56CCFB1E4B0
File Size:
1.10 MB, 1095728 bytes
|
|
MD5:
4e213d2e21e768579d33645738c2c19f
SHA1:
daf638b0b8354d73a1ae7677089d0ae069a0dd8d
SHA256:
CA2EB8AC848E36E50DC6B489D2CECAAE28F872B4C2540A3DF512783846746C7D
File Size:
1.10 MB, 1103160 bytes
|
|
MD5:
cefcb24ea7d0ec18ce00336d46814e97
SHA1:
7dfaee6044944e38061f9998433f8a4f2878b6a8
SHA256:
C907D5F498820D3834859761510FB4D944E304EDD9AB1F36BB96660E6FDE4B41
File Size:
1.09 MB, 1094456 bytes
|
|
MD5:
e30b7d9e68a4178e09389862711d8bf1
SHA1:
7def1cc1e511c2c77141a15a1acb01ffdc271bbe
SHA256:
E9A2437966DB6B80E3335DD221C7085680156862CF88F5C925D3EEDFC2A1A13F
File Size:
1.08 MB, 1082896 bytes
|
|
MD5:
a19bb6fa182732330e4389da11abe1de
SHA1:
63d05ca277e92a6dd8a93cbb6697cf184aa86c54
SHA256:
79545BDEF9DA3EB4AE5D8EAC2E83FF7524B94721E222BEA55CC7807EBB7F31C7
File Size:
1.08 MB, 1078732 bytes
|
|
MD5:
ba39a86173dc9b4d9799f534240d5ae0
SHA1:
31e288a7b8f1cd7acdfea3af6697f57535bce5dc
SHA256:
F13CC4E5DABDBA57BA2B2E6A6112B51B5DEA0847918A93B09993AE433720447E
File Size:
1.09 MB, 1091088 bytes
|
|
MD5:
34b656147ad037217212a45ce7c4164a
SHA1:
94f184b00da73f4b27814824305f086cc11787fc
SHA256:
E927D844BA1D0601879E5F1818FDDAE6CD20C89699DD21428F93BF3D7DCAD8EB
File Size:
1.13 MB, 1131108 bytes
|
|
MD5:
2918a3fb943b0f0a91d399efb0dd15f5
SHA1:
dde82f0d1329e719d2b978d00283e53425aa567e
SHA256:
8FC870F99354D3A6D3814CAB0F6326C347CECE51FB69BC2F66A7CA646432FA66
File Size:
1.10 MB, 1095256 bytes
|
|
MD5:
24b31ea6e9c165c3a96c08e6827d3bee
SHA1:
f1e4085ebfc4245bffb8c4e8174b775394b7e05e
SHA256:
677F3B5309BE5AE4FB87D3EFACD66F28F710DB5B591F00B432BBF6F6A71092CB
File Size:
1.13 MB, 1127488 bytes
|
|
MD5:
9ef3911531b238b3705b7fe686be0848
SHA1:
fe82005b91e84acaa1df1f92d405556358250cbc
SHA256:
8F3344FEFDFF2AB67E11661D7CA8B2C2DC4FCDCE1271A2465C504473914AA479
File Size:
1.14 MB, 1141400 bytes
|
|
MD5:
04b917332b3fc7726998f8eef1f5cdaf
SHA1:
dd6c9f96e6b9a7f515508188ab8e9842d41267a3
SHA256:
A402EB073ADB6EED6AEC337B65CB279A281FC97ADC8BC4E7C8A1FAE69814F7C4
File Size:
1.10 MB, 1101276 bytes
|
|
MD5:
758fc46e81b1c4a319e05031463a5b86
SHA1:
739f51ecf58d587b861b6b4ea8f1f09d132654e5
SHA256:
083B267E25CBB1FD82205751D73BAFE1A054F12632D101C4251A7B0B7AE4352E
File Size:
1.12 MB, 1115640 bytes
|
|
MD5:
c0b39c609de91d427a82b88010cecf08
SHA1:
8e2e537a10a85a3e531aecf612af81444cfa3bee
SHA256:
F95B6C5952B1E4478AF42192CAF01107717F93ECC11316A5FFCCC12254D18AC6
File Size:
1.14 MB, 1136552 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have security information
- File has exports table
- File has TLS information
- File is 64-bit executable
- File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
Show More
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Company Name |
Show More
|
| File Description |
Show More
|
| File Version |
Show More
|
| Internal Name |
Show More
|
| Legal Copyright |
Show More
|
| Original Filename |
Show More
|
| Product Name |
Show More
|
| Product Version |
Show More
|
File Traits
- big overlay
- dll
- fptable
- HighEntropy
- Installer Manifest
- Installer Version
- ntdll
- x64
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 489 |
|---|---|
| Potentially Malicious Blocks: | 32 |
| Whitelisted Blocks: | 408 |
| Unknown Blocks: | 49 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Agent.FTS
- Agent.KUH
- Agent.MIC
- Agent.MPD
- Agent.VYB
Show More
- CobaltStrike.SVN
- Injector.BIB
- Injector.BUB
- Kryptik.CTD
- Kryptik.CTF
- Kryptik.DEQ
- Kryptik.GUB
- LockScreen.AG
- Lumma.JC
- Marte.CP
- Rozena.XV
- ShellcodeRunner.RRB
- Trojan.Agent.Gen.BCO
- Trojan.Agent.Gen.BGO
- Trojan.Agent.Gen.BNR
- Trojan.Agent.Gen.BPF
- Trojan.Downloader.Gen.KG
- Trojan.Injector.Gen.GOC
- Trojan.Kryptik.Gen.CFT
- Trojan.Kryptik.Gen.DBQ
- Trojan.Kryptik.Gen.DKA
- Trojan.Kryptik.Gen.DOM
- Trojan.Kryptik.Gen.DUH
- Trojan.Kryptik.Gen.DZH
- Trojan.Kryptik.Gen.EAW
- Trojan.Kryptik.Gen.EEG
- Trojan.ShellcodeRunner.Gen.KE
- Trojan.ShellcodeRunner.Gen.KI
- Trojan.ShellcodeRunner.Gen.KS
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
|
| Encryption Used |
|
| Anti Debug |
|