Threat Database Trojans Trojan.MSIL.Krypt.YAGK

Trojan.MSIL.Krypt.YAGK

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 21,967
Threat Level: 80 % (High)
Infected Computers: 70
First Seen: September 24, 2024
Last Seen: February 21, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.MSIL.Krypt.YAGK
Signature status: No Signature

Known Samples

MD5: 2522a3420dbbff2c470e4cd436e49a65
SHA1: 27300b42400a67f33f2cecc4e9f590d7fdec25e9
SHA256: 7F174ABF899DB56909340A7C5B62A1C966E2F3FFDBB12FC8E8E123141E0D4785
File Size: 317.95 KB, 317952 bytes
MD5: 14e12607cb5536460f54f26d79f2a1e1
SHA1: 4a95244355c1ea143a23bb3adc8c0a11c9752493
SHA256: 3121D17F6A14DD9A8C89B6DA01B34DCA084FB7C5CED60A72021569D0920CE6E2
File Size: 325.63 KB, 325632 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have security information
  • File is .NET application
  • File is 32-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Assembly Version 1.0.0.0
Comments stinkards planula subindexes
Company Name poppa tangles ritualizations
File Description coteaux
File Version 1.0.0.0
Internal Name
  • Fge.exe
  • VQP.exe
Legal Copyright Copyright 2024
Original Filename
  • Fge.exe
  • VQP.exe
Product Name stemsons unshipped outsmokes
Product Version 1.0.0.0

File Traits

  • .NET
  • HighEntropy
  • x86

Block Information

Total Blocks: 8
Potentially Malicious Blocks: 5
Whitelisted Blocks: 3
Unknown Blocks: 0

Visual Map

0 0 x x x x x 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • MSIL.Krypt.YAGK

Files Modified

File Attributes
\device\namedpipe\gmdasllogger Generic Write,Read Attributes

Windows API Usage

Category API
User Data Access
  • GetUserDefaultLocaleName
  • GetUserObjectInformation
Process Manipulation Evasion
  • NtUnmapViewOfSection
Encryption Used
  • BCryptOpenAlgorithmProvider
Anti Debug
  • NtQuerySystemInformation

Trending

Most Viewed

Loading...