Threat Database Trojans Trojan.MSIL.Krypt.EDCR

Trojan.MSIL.Krypt.EDCR

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 24,338
Threat Level: 80 % (High)
Infected Computers: 407
First Seen: August 25, 2022
Last Seen: November 26, 2025
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.MSIL.Krypt.EDCR
Signature status: Hash Mismatch

Known Samples

MD5: 0ef107ba3be09eab56c60bd0bf6a9747
SHA1: 723332a9cb33a21d42dd78b7eb7a1fdd56298cc7
SHA256: CE220A02FA38E159349F740D3A6527EE4CD60E33DB0CE8C24A608A0D31E02A45
File Size: 94.25 KB, 94248 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File is .NET application
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Assembly Version 1.0.0.0
Comments Mohel Banqueters
Company Name Shorten Buddleias
File Description tribulation amobarbital tarnishes
File Version 1.0.0.0
Internal Name MSG.exe
Legal Copyright Copyright © 2024
Original Filename MSG.exe
Product Name Grippers
Product Version 1.0.0.0

Digital Signatures

Signer Root Status
NVIDIA Corporation DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1 Hash Mismatch

File Traits

  • .NET
  • RijndaelManaged
  • x86

Block Information

Total Blocks: 73
Potentially Malicious Blocks: 1
Whitelisted Blocks: 65
Unknown Blocks: 7

Visual Map

0 0 0 ? ? 0 ? 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 ?
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • MSIL.AgentTesla.LP
  • MSIL.RustHack.H
  • MSIL.Stealer.BDP

Files Modified

File Attributes
c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\svhost.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\windows\microsoft.net\framework\v4.0.30319\regasm.exe Synchronize,Write Attributes

Windows API Usage

Category API
User Data Access
  • GetUserDefaultLocaleName
  • GetUserObjectInformation
Anti Debug
  • NtQuerySystemInformation
Process Manipulation Evasion
  • NtUnmapViewOfSection

Trending

Most Viewed

Loading...