Threat Database Trojans Trojan.MSIL.Krypt.TAEIA

Trojan.MSIL.Krypt.TAEIA

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 21,064
Threat Level: 80 % (High)
Infected Computers: 3
First Seen: March 16, 2022
Last Seen: August 7, 2025
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.MSIL.Krypt.TAEIA
Signature status: No Signature

Known Samples

MD5: fcfbfb20b8b34714311049a339fbd871
SHA1: 4c87dceb40c5c69bb4b9b52228e6c66761d1c96f
SHA256: A249E291C4A4F81716F8078F103A952EF14AABFB24638189B35AFFF752591A59
File Size: 4.17 MB, 4172452 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have security information
  • File is .NET application
  • File is 32-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Assembly Version 1.0.0.3
File Description Mishandling
File Version 1.0.0.3
Internal Name Reboot.exe
Legal Copyright Copyright © 2023
Original Filename Reboot.exe
Product Name Superstars
Product Version 1.0.0.3

File Traits

  • .NET
  • big overlay
  • GenKrypt
  • HighEntropy
  • x86

Block Information

Total Blocks: 17
Potentially Malicious Blocks: 3
Whitelisted Blocks: 6
Unknown Blocks: 8

Visual Map

? ? 0 x 0 ? 0 x ? 0 ? ? 0 x 0 ? ?
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Windows API Usage

Category API
User Data Access
  • GetComputerNameEx
  • GetUserDefaultLocaleName
  • GetUserObjectInformation
Anti Debug
  • NtQuerySystemInformation
Process Manipulation Evasion
  • NtUnmapViewOfSection
Other Suspicious
  • AdjustTokenPrivileges
Encryption Used
  • BCryptOpenAlgorithmProvider

Trending

Most Viewed

Loading...