Threat Database Trojans Trojan.MSIL.Krypt.GEBV

Trojan.MSIL.Krypt.GEBV

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 25,805
Threat Level: 80 % (High)
Infected Computers: 1
First Seen: May 13, 2022
Last Seen: February 18, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.MSIL.Krypt.GEBV
Signature status: No Signature

Known Samples

MD5: c84cf4ab39a12f37c32e98e109c6a7a2
SHA1: d86aec172f71586d4c8e0113ac784f8a405f0edd
SHA256: BCDB0EF8D9B74FFEFCB5F976E01B24CE0604CF96DB2A2A1E977C2F73A22835ED
File Size: 242.18 KB, 242176 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have security information
  • File is .NET application
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Assembly Version 0.0.0.0
File Version 0.0.0.0
Internal Name Intriga Dev.exe
Original Filename Intriga Dev.exe
Product Version 0.0.0.0

File Traits

  • .NET
  • NewLateBinding
  • RijndaelManaged
  • x86

Block Information

Total Blocks: 26
Potentially Malicious Blocks: 14
Whitelisted Blocks: 12
Unknown Blocks: 0

Visual Map

0 0 x 0 0 0 0 0 0 0 0 0 0 x x x x x x x x x x x x x
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • MSIL.Krypt.GEBV
  • MSIL.Krypt.YBAY

Files Modified

File Attributes
c:\users\user\appdata\roaming\microsofttemp.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144

Windows API Usage

Category API
User Data Access
  • GetUserDefaultLocaleName
  • GetUserObjectInformation
Process Shell Execute
  • CreateProcess
Encryption Used
  • BCryptOpenAlgorithmProvider
Anti Debug
  • NtQuerySystemInformation
Process Manipulation Evasion
  • NtUnmapViewOfSection
  • ReadProcessMemory
  • VirtualAllocEx

Shell Command Execution

schtasks /create /f /sc minute /mo 1 /tn "'d86aec172f71586d4c8e0113ac784f8a405f0edd_0000242176'" /tr "'C:\Users\Kwkamzub\AppData\Roaming\MicrosoftTemp.exe'"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regasm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regasm.exe"

Trending

Most Viewed

Loading...