Threat Database Trojans Trojan.MSIL.Krypt.EEEO

Trojan.MSIL.Krypt.EEEO

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 24,324
Threat Level: 80 % (High)
Infected Computers: 203
First Seen: April 26, 2022
Last Seen: January 15, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.MSIL.Krypt.EEEO
Signature status: No Signature

Known Samples

MD5: e0e9d3466bcf81652257164814c7caa0
SHA1: 74a088ae4dba4941d3283c76446dbe2ef4aafc25
SHA256: C13BB6F7898423AD218937BE8AEB400F41DB857AC350093E837A5EED06AE31DC
File Size: 192.00 KB, 192000 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have security information
  • File is .NET application
  • File is 32-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Assembly Version 1.0.0.0
File Description SharpPotato
File Version 1.0.0.0
Internal Name SweetPotato.exe
Legal Copyright Copyright © 2020
Original Filename SweetPotato.exe
Product Name SharpPotato
Product Version 1.0.0.0

File Traits

  • .NET
  • x86

Block Information

Total Blocks: 1,358
Potentially Malicious Blocks: 268
Whitelisted Blocks: 971
Unknown Blocks: 119

Visual Map

0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 x 0 0 0 x x x x 0 x 0 x x x 0 x x x x 0 0 0 0 x 0 0 x x 0 0 0 0 x x 0 x x x x x 0 0 x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 x 0 x 0 0 x 0 x 0 0 0 0 x 0 0 0 0 0 0 x 0 x 0 x 0 0 0 0 x 0 x 0 0 0 0 x 0 x 0 0 x 0 x 0 x 0 0 0 0 x 0 x 0 0 0 0 x 0 x 0 0 0 0 x 0 x 0 0 x 0 x 0 x 0 0 0 0 x 0 x 0 0 x 0 0 0 0 0 ? 0 x 0 x 0 0 0 0 x 0 x 0 0 x 0 0 0 0 0 0 0 0 ? ? ? ? x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x 0 0 x x ? ? 0 ? ? ? x 0 x x 0 x x ? ? x ? x ? ? ? ? ? ? ? ? ? ? ? 0 x ? 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 x 0 0 0 0 0 x ? 0 ? 0 0 x 0 x 0 x 0 0 x 0 0 0 0 0 0 0 0 x 0 x 0 0 x 0 0 0 0 0 0 0 0 x 0 x 0 0 x 0 x 0 0 0 0 0 x ? 0 ? 0 0 x 0 x 0 x 0 0 x 0 x 0 x 0 0 x 0 x 0 x 0 0 x 0 0 0 0 0 0 0 x 0 x 0 0 0 0 x 0 x 0 0 x 0 0 0 0 0 0 0 x 0 x 0 0 0 0 x 0 x 0 0 0 0 x 0 0 0 0 0 x ? 0 ? 0 0 x 0 x 0 x 0 0 0 0 x 0 x 0 0 x 0 x 0 x 0 0 x 0 x 0 x 0 0 x 0 x 0 x 0 0 x 0 0 0 0 0 0 0 0 x 0 x 0 0 x 0 x 0 0 0 0 0 x ? 0 ? 0 0 x 0 x 0 x 0 0 0 0 x 0 0 0 0 0 x ? 0 ? 0 0 x 0 x 0 x 0 0 x 0 0 0 0 0 0 0 0 x 0 x 0 0 x 0 x 0 0 0 0 0 x ? 0 ? 0 0 x 0 x 0 x 0 0 0 0 x 0 x 0 0 0 0 x 0 0 0 0 0 x ? 0 ? 0 0 x 0 x 0 x 0 0 0 0 x 0 x 0 0 0 0 x 0 x 0 0 0 0 x 0 x 0 0 x 0 x 0 0 0 0 x 0 0 x 0 0 0 0 0 x ? 0 ? 0 ? 0 0 x 0 x 0 0 0 0 x 0 x 0 0 x 0 x 0 0 0 0 0 x ? 0 ? 0 0 x 0 x 0 x 0 0 0 0 x 0 x 0 0 x 0 x 0 x 0 0 0 0 x 0 x 0 0 x 0 x 0 x 0 0 0 x ? 0 ? 0 0 x 0 x 0 0 0 0 0 x ? 0 ? 0 0 x 0 x 0 x 0 0 x 0 0 0 0 0 0 0 x 0 x 0 0 x 0 x 0 x 0 0 x 0 x 0 0 0 0 0 x ? 0 ? 0 0 x 0 0 0 0 0 0 0 0 x 0 0 0 0 x 0 0 x 0 x 0 0 0 0 x 0 0 0 0 0 x ? 0 ? 0 0 x 0 x 0 x 0 0 0 0 x 0 0 0 0 x 0 0 x 0 x 0 0 x 0 x 0 0 0 0 0 x ? 0 ? 0 0 x 0 x 0 x 0 0 0 0 x 0 0 0 ? 0 0 x 0 0 0 0 0 x ? 0 ? 0 0 x 0 x 0 x 0 0 x 0 x 0 x 0 0 0 0 x 0 0 0 0 0 x ? 0 ? 0 0 0 0 x 0 x 0 0 0 0 x 0 x 0 0 0 0 x 0 0 0 0 x 0 0 x 0 0 0 0 0 x ? 0 ? 0 0 0 0 x 0 x 0 0 x 0 0 0 0 0 0 0 0 x 0 x 0 0 x 0 x 0 x 0 0 0 0 x 0 x 0 0 0 0 ? ? ? ? 0 ? ? 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? x 0 0 0 0 0 0 x x 0 x x x 0 x 0 x x 0 ? x 0 0 0 x 0 0 x x 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
\device\namedpipe\6a407f14-0b69-42f8-8274-c37ede2a509e\pipe\spoolss Generic Read,Write Data,Write Attributes,Write extended,Append data

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAlertThreadByThreadId
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtClearEvent
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateEvent
  • ntdll.dll!NtCreateMutant
  • ntdll.dll!NtCreatePrivateNamespace
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtCreateThreadEx
Show More
  • ntdll.dll!NtDeviceIoControlFile
  • ntdll.dll!NtDuplicateObject
  • ntdll.dll!NtEnumerateKey
  • ntdll.dll!NtEnumerateValueKey
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenDirectoryObject
  • ntdll.dll!NtOpenEvent
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcess
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenThreadToken
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryDefaultLocale
  • ntdll.dll!NtQueryDirectoryFileEx
  • ntdll.dll!NtQueryFullAttributesFile
  • ntdll.dll!NtQueryInformationFile
  • ntdll.dll!NtQueryInformationJobObject
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryLicenseValue
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQuerySecurityObject
  • ntdll.dll!NtQuerySystemInformation
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtQueryWnfStateData
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtReadRequestData
  • ntdll.dll!NtReleaseMutant
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtResumeThread
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationKey
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationThread
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtSubscribeWnfStateChange
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtUnmapViewOfSectionEx
  • ntdll.dll!NtWaitForAlertByThreadId
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWriteFile
  • ntdll.dll!NtYieldExecution
  • UNKNOWN
User Data Access
  • GetUserDefaultLocaleName
  • GetUserObjectInformation
Other Suspicious
  • AdjustTokenPrivileges
Network Winsock2
  • WSASocket
  • WSAStartup
Network Winsock
  • closesocket
  • gethostname
  • setsockopt

Trending

Most Viewed

Loading...