Threat Database Trojans Trojan.MSIL.Krypt.GDH

Trojan.MSIL.Krypt.GDH

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 20,744
Threat Level: 80 % (High)
Infected Computers: 329
First Seen: March 7, 2022
Last Seen: January 14, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.MSIL.Krypt.GDH
Signature status: No Signature

Known Samples

MD5: d08efe8c53c59c56000d3aa752633d48
SHA1: a10a7ff9e217f79435e118d679ff2ab9b8c4b3d5
SHA256: A18D5A329334A220EE8840BA07A76F550056A6F23F33F3FBD5CC8B169D5590D2
File Size: 367.10 KB, 367104 bytes
MD5: 4525f2c1fa349674724a1e9774ac7cbe
SHA1: 08dd92da0f19c995ad922ee3f9cfc81aa911c6d0
SHA256: 2564312C06AD74494B7258A62CFB8A4F2370850B9BA1B7D90C13DDD91E81FA32
File Size: 262.14 KB, 262144 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have security information
  • File is .NET application
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Assembly Version
  • 8.1.0.0
  • 2.2.0.8
Comments Important System Files
Company Name Multiflow Rev
File Description
  • Crystal Display
  • Diamond Apps v2.0
File Version
  • 8.1.0.0
  • 2.3.4.8
Internal Name
  • DiamondApps.exe
  • server1.exe
Legal Copyright
  • Copyright © 2020
  • Copyright © 2025 Mchezz Crystal Clear Display
Legal Trademarks All Right Reserved Display
Original Filename
  • DiamondApps.exe
  • server1.exe
Product Name
  • Clear Display
  • Diamond Apps v2.0
Product Version
  • 8.1.0.0
  • 2.3.4.8

File Traits

  • .NET
  • Confuser
  • HighEntropy
  • RijndaelManaged
  • x86

Block Information

Total Blocks: 175
Potentially Malicious Blocks: 21
Whitelisted Blocks: 36
Unknown Blocks: 118

Visual Map

0 ? x 0 x 0 0 0 0 0 ? x 0 0 0 0 0 0 0 x x x 0 0 0 0 ? x x ? 0 x x 0 ? ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? ? ? ? ? ? ? 0 ? x ? x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? ? ? x ? ? ? ? x ? ? ? ? ? ? ? ? x x x x 0 x x ? ? ? ? ? ? ? ? 0 ? 0 ? ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? ? 0 x ? 0 0 ? ? 0 0 0 0 ?
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
c:\users\user\appdata\roaming\b393b0 Synchronize,Write Attributes
c:\users\user\appdata\roaming\b393b0\01ab29.exe Synchronize,Write Attributes
c:\users\user\appdata\roaming\b393b0\01ab29.exe Synchronize,Write Data
c:\users\user\appdata\roaming\b393b0\01ab29.lck Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-3119368278-1123331430-659265220-1001 Generic Write,Read Attributes
c:\users\user\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-3119368278-1123331430-659265220-1001\f58155b4b1d5a524ca0261c3ee99fb50_bfeb5820-9643-42ad-a79f-071dff4d8e64 Generic Write,Read Attributes
c:\users\user\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-3119368278-1123331430-659265220-1001\f58155b4b1d5a524ca0261c3ee99fb50_bfeb5820-9643-42ad-a79f-071dff4d8e64_deleted_ Generic Write,Read Attributes
c:\users\user\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-3119368278-1123331430-659265220-1001\f58155b4b1d5a524ca0261c3ee99fb50_bfeb5820-9643-42ad-a79f-071dff4d8e64_deleted__deleted_ Generic Write,Read Attributes
c:\users\user\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-3119368278-1123331430-659265220-1001\f58155b4b1d5a524ca0261c3ee99fb50_bfeb5820-9643-42ad-a79f-071dff4d8e64_deleted__deleted__deleted_ Generic Write,Read Attributes
c:\users\user\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-3119368278-1123331430-659265220-1001\f58155b4b1d5a524ca0261c3ee99fb50_bfeb5820-9643-42ad-a79f-071dff4d8e64_deleted__deleted__deleted__deleted_ Generic Write,Read Attributes

Windows API Usage

Category API
User Data Access
  • GetComputerNameEx
  • GetUserDefaultLocaleName
  • GetUserObjectInformation
Anti Debug
  • IsDebuggerPresent
  • NtQuerySystemInformation
Encryption Used
  • BCryptOpenAlgorithmProvider
Other Suspicious
  • AdjustTokenPrivileges
Process Manipulation Evasion
  • NtUnmapViewOfSection
  • NtWriteVirtualMemory
  • VirtualAllocEx
Process Shell Execute
  • CreateProcess

Shell Command Execution

c:\users\user\downloads\a10a7ff9e217f79435e118d679ff2ab9b8c4b3d5_0000367104
c:\users\user\downloads\a10a7ff9e217f79435e118d679ff2ab9b8c4b3d5_0000367104

Trending

Most Viewed

Loading...