Trojan.MSIL.Krypt.YDAH
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 11,785 |
| Threat Level: | 80 % (High) |
| Infected Computers: | 4,210 |
| First Seen: | June 28, 2021 |
| Last Seen: | March 17, 2026 |
| OS(es) Affected: | Windows |
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.MSIL.Krypt.YDAH |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
d9ef1dcd8809498181d8300e7c304f1b
SHA1:
5922567fbf99f8a0115ffa404b8353e10dc5b200
File Size:
9.49 MB, 9487360 bytes
|
|
MD5:
e909d06927515add2457953b8482e03b
SHA1:
aad9713cb724079a323c74a0166c7582e6eb64fd
SHA256:
5B6C8B770AF7D7AD7A187BC769D9DC08A09F544FD887D5DDB20326FF0DA25DC5
File Size:
5.87 MB, 5873152 bytes
|
|
MD5:
50de8cebcbedf2a6439a968e6f5af2b4
SHA1:
d5f314bd2994f74e84b8fbf408901733fa59f4f2
SHA256:
B9871AC7470FD2DE0387BE87207F5FB6F0F4B8E4C767D21CC5DEC5856D64E56D
File Size:
2.81 MB, 2810880 bytes
|
|
MD5:
57d2fcafbc90ef538695c41a4074178d
SHA1:
2e9d8bf4d3c2e1323fe03e4604235d33f151c842
SHA256:
F1E8E8809ACF51D5AEA24C717F5E800D1A44E871D1AFCC26C46730E7FC06A5EF
File Size:
4.13 MB, 4126208 bytes
|
|
MD5:
347e48d7e594897f0ab66782a7f952f6
SHA1:
606aab94ba402b31ef67163a45d967052b630709
SHA256:
FDDFFC11AA5C6BAD7BFBAE0EB9343A7AFE5270857B015F840913318770904824
File Size:
3.88 MB, 3882496 bytes
|
Show More
|
MD5:
a7c0d5053346cad216fc475eb403caa9
SHA1:
bbcf88408b69a3029d5868be151e50f8a6195c4b
SHA256:
63BB33370A017AB654E2CFC9A785A1FDFCFCDD6EFFCB29603D3F72444DDCE1F4
File Size:
400.90 KB, 400896 bytes
|
|
MD5:
5b5a1f8292ddd73982618dc7cd79fca0
SHA1:
69d0cb62a56afc36227720586a1f9e9df6d19305
SHA256:
8D065621A24F3C12723A50A1BDDEDDCB15795ED86B0AAF8B6E87122217A2A564
File Size:
3.36 MB, 3359744 bytes
|
|
MD5:
8f21da26924b413b1e09f9c85eeaf13c
SHA1:
27bda3108e0a26bcd82528f523d269dfbea1126d
SHA256:
4A4EEA5D6F6468C273672E798B192B81D596323A17711DDF697AC1C025C447AE
File Size:
6.11 MB, 6108160 bytes
|
|
MD5:
af394c3267daca92648575ae330bbd69
SHA1:
402015ba92ade84446847863e1c8b95d0e284ce2
SHA256:
4870F60895E8B8EDCE8A2E8D01AB6A5E2B94970A2DCAC60DFD5DFD4F6E9C948B
File Size:
3.69 MB, 3693297 bytes
|
|
MD5:
c955ac25739e83df4de46dcf9468fb12
SHA1:
b7d6aaad35f56934260bd8f961287af7c4d550a2
SHA256:
9C603FCB8086ACD741912E9EA60FC5F33785FDEB36D6B22A9771578E777F8CF6
File Size:
7.44 MB, 7440384 bytes
|
|
MD5:
d98c1a898a2435854633b756b03ca6bc
SHA1:
1371f4cb617100e1fa6c3b42fbb776a8a768ef35
SHA256:
08C244BC98FCF25D240251619877EE0A9D46C28A04047BD38D365C7B60A85AD4
File Size:
3.84 MB, 3843072 bytes
|
|
MD5:
843237460913e360745585d61799649e
SHA1:
fd6a6c5b10deb81518122e7be24512d74bd4425d
SHA256:
18E46F9E4D190AAAF56C97E39FF8F9C4DEB63BEC9C0D7D686820B7E8624D5070
File Size:
1.76 MB, 1759744 bytes
|
|
MD5:
5e1d089da171f4569c208d0eaa7fcc2a
SHA1:
68b126894f8ddae45c7930baedc35b660708c956
SHA256:
31DD54DA4627007F0CE7A4581BC1AD9761C21AFF0958526C002A2D0592489A1D
File Size:
3.71 MB, 3706107 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File is .NET application
- File is 32-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
Show More
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Show More
Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Assembly Version |
|
| Comments |
|
| Company Name |
|
| inFo@Dr-FarFar.CoM | |
| File Description |
Show More
|
| File Version |
|
| Internal Name |
Show More
|
| Legal Copyright |
|
| Legal Trademarks |
|
| Original Filename |
Show More
|
| Product Name |
Show More
|
| Product Version |
|
| Website | https://www.Dr-FarFar.com |
File Traits
- .NET
- GenKrypt
- HighEntropy
- NewLateBinding
- Reactor
- Reflective
- RijndaelManaged
- SmartAssembly
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- MSIL.Agent.OAAR
- MSIL.Agent.OAAU
- MSIL.BadJoke.XF
- MSIL.Bladabindi.LB
- MSIL.Bladabindi.LE
Show More
- MSIL.ClipBanker.HJ
- MSIL.Downloader.PFB
- MSIL.Heracles.IP
- MSIL.Injector.FSA
- MSIL.Krypt.MJK
- MSIL.Krypt.YDPI
- MSIL.Kryptik.SA
- MSIL.Tedy.F
- MSIL.Tedy.NN
- MSIL.Ursu.TJA
- MSIL.Ursu.TJC
- MSIL.Ursu.TJF
- MSIL.Ursu.TJG
- Stealer.UHAN
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| c:\users\user\appdata\local\temp\costura\526ad3bb6e6aa2bd107c0b26e44139ab\32\bass.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\costura\526ad3bb6e6aa2bd107c0b26e44139ab\32\flexnetpatchlibrary.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\tring_doo\aad9713cb724079a323c74a01_url_rj21fm4vfzalhucpmmh3sepyqwaqphwo\3.1.8851.24335\skdsu_en.newcfg | Generic Write,Read Attributes |
| c:\users\user\appdata\local\tring_doo\aad9713cb724079a323c74a01_url_rj21fm4vfzalhucpmmh3sepyqwaqphwo\3.1.8851.24335\skdsu_en.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\tring_doo\aad9713cb724079a323c74a01_url_rj21fm4vfzalhucpmmh3sepyqwaqphwo\3.1.8851.24335\user.config | Synchronize,Write Data |
| c:\users\user\downloads\.logs\error 18-12-2025.log | Generic Write,Read Attributes |
| c:\users\user\downloads\app.cs | Generic Write,Read Attributes |
| c:\users\user\downloads\patcher_log.txt | Generic Write,Read Attributes |
| c:\users\user\downloads\tfsinterfacelog.txt | Generic Write,Read Attributes |
| c:\users\user\downloads\zynect.cfg | Generic Write,Read Attributes |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\content::cacheprefix | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\cookies::cacheprefix | Cookie: | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\history::cacheprefix | Visited: | RegNtPreCreateKey |
| HKLM\software\wow6432node\microsoft\tracing::enableconsoletracing | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasapi32::enablefiletracing | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasapi32::enableautofiletracing | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasapi32::enableconsoletracing | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasapi32::filetracingmask | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasapi32::consoletracingmask | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasapi32::maxfilesize | RegNtPreCreateKey |
Show More
| HKLM\software\wow6432node\microsoft\tracing\rasapi32::filedirectory | %windir%\tracing | RegNtPreCreateKey |
| HKLM\software\wow6432node\microsoft\tracing\rasmancs::enablefiletracing | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasmancs::enableautofiletracing | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasmancs::enableconsoletracing | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasmancs::filetracingmask | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasmancs::consoletracingmask | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasmancs::maxfilesize | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasmancs::filedirectory | %windir%\tracing | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| User Data Access |
|
| Anti Debug |
|
| Encryption Used |
|
| Other Suspicious |
|
| Syscall Use |
Show More
|
| Process Shell Execute |
|
| Network Winsock2 |
|
| Network Winsock |
|
| Network Winhttp |
|
| Network Info Queried |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
(NULL) https://www.Dr-FarFar.com/random
|