Threat Database Trojans Trojan.MSIL.Krypt.ABQHB

Trojan.MSIL.Krypt.ABQHB

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 19,510
Threat Level: 80 % (High)
Infected Computers: 46
First Seen: November 15, 2023
Last Seen: November 6, 2025
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.MSIL.Krypt.ABQHB
Signature status: No Signature

Known Samples

MD5: 08a9a3a35b606a9714e7b835d9f0fb7f
SHA1: 32a376cfedce17342f496809659254fac9b50936
SHA256: F340C1AE0D6461A686D703E05335E962607691FE2F99056FB9A309E00F21FC99
File Size: 79.36 KB, 79360 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have security information
  • File is .NET application
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments www.midasmedia.de
Company Name Midas Media
File Description Bildschirmlineal
File Version 1.0.0.3
Internal Name Bildschirmlineal
Legal Copyright Midas Media 2006
Original Filename Bildschirmlineal.exe
Product Name Bildschirmlineal
Product Version 1.0.0.0

File Traits

  • .NET
  • HighEntropy
  • SmartAssembly
  • x86

Block Information

Total Blocks: 93
Potentially Malicious Blocks: 32
Whitelisted Blocks: 61
Unknown Blocks: 0

Visual Map

x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • MSIL.Bladabindi.EA
  • MSIL.Dropper.SCC
  • MSIL.Dropper.SF
  • MSIL.Krypt.ABQHB
  • MSIL.Krypt.GBBCD
Show More
  • MSIL.RedLine.P

Windows API Usage

Category API
User Data Access
  • GetUserDefaultLocaleName
  • GetUserObjectInformation
Process Manipulation Evasion
  • ReadProcessMemory
  • VirtualAllocEx

Trending

Most Viewed

Loading...