Threat Database Trojans Trojan.MSIL.Krypt.MBBOA

Trojan.MSIL.Krypt.MBBOA

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 24,552
Threat Level: 80 % (High)
Infected Computers: 14
First Seen: July 22, 2023
Last Seen: May 1, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.MSIL.Krypt.MBBOA
Signature status: No Signature

Known Samples

MD5: ef547fe9adc0b60c04647ad7d2e0b186
SHA1: ce905726eabcbc2de33db1acd31485fc58456c25
SHA256: 5D64364476E93189AC63BCFE287BC8A12B0829BD3CAF48B9A65AAC1CAA977D50
File Size: 3.78 MB, 3783995 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have relocations information
  • File doesn't have security information
  • File has exports table
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments This installation was built with Inno Setup.
Company Name DM SOFTWARE
File Description PUNTO DE VENTA Setup
Product Name PUNTO DE VENTA
Product Version 1.0.0

File Traits

  • .NET
  • x86

Files Modified

File Attributes
c:\users\user\appdata\local\temp\is-i55pi.tmp\ce905726eabcbc2de33db1acd31485fc58456c25_0003783995.tmp Generic Write,Read Attributes

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
User Data Access
  • GetUserObjectInformation

Shell Command Execution

"C:\Users\Lhtljsgo\AppData\Local\Temp\is-I55PI.tmp\ce905726eabcbc2de33db1acd31485fc58456c25_0003783995.tmp" /SL5="$C03A4,2930185,887808,c:\users\user\downloads\ce905726eabcbc2de33db1acd31485fc58456c25_0003783995"

Trending

Most Viewed

Loading...