Threat Database Trojans Trojan.MSIL.Krypt.YDKV

Trojan.MSIL.Krypt.YDKV

By CagedTech in Trojans

Analysis Report

General information

Family Name: Trojan.MSIL.Krypt.YDKV
Signature status: Modified signature

Known Samples

MD5: 95c1401b7acdf050bcd9d8cd755bc07e
SHA1: e0a82ec1fef33bd757ebd7b52fe8151db660c38d
SHA256: 13E42405695414444A513FD95E908518B2945E9A12DC54687BFFCAC6CC80A8EA
File Size: 3.72 MB, 3720056 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File is .NET application
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Assembly Version 1.0.4171.21401
File Description Oscuxb
File Version 1.0.7252.19527
Internal Name Oscuxb.exe
Legal Copyright Copyright © 2017
Original Filename Oscuxb.exe
Product Name Oscuxb
Product Version 1.0.7252.19527

File Traits

  • .NET
  • HighEntropy
  • RijndaelManaged
  • x86

Block Information

Total Blocks: 6,432
Potentially Malicious Blocks: 215
Whitelisted Blocks: 4,839
Unknown Blocks: 1,378

Visual Map

x ? ? ? ? 0 ? ? ? ? 0 ? 0 ? ? 0 x x ? 0 ? ? x 0 ? 0 x ? x ? ? 0 0 ? x x ? ? x x x x ? ? 0 0 ? 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? ? ? x x ? ? ? ? 0 0 ? ? ? ? ? ? 0 ? 0 x 0 ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? ? 0 ? ? ? ? ? ? ? ? ? 0 ? ? ? ? ? 0 0 ? ? 0 0 ? 0 0 ? ? 0 0 x 0 ? ? ? ? ? ? ? ? ? ? 0 0 ? ? ? 0 ? x 0 ? 0 0 0 0 0 0 x 0 0 ? 0 x 0 ? ? 0 ? ? ? ? 0 0 0 ? ? ? ? 0 x 0 ? ? x 0 ? ? ? 0 ? 0 0 x 0 0 ? ? 0 x 0 0 0 ? ? ? ? 0 ? ? ? ? ? 0 x x 0 0 ? ? 0 ? ? ? ? ? 0 ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? ? ? ? ? ? 0 0 x 0 ? ? ? ? ? ? x ? 0 ? ? ? ? ? ? ? x ? 0 ? x x ? 0 ? ? 0 0 ? x 0 ? ? ? 0 ? ? 0 0 0 ? 0 0 0 0 x ? 0 ? ? 0 ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? 0 ? ? 0 0 0 ? ? ? 0 ? x 0 ? x x ? ? ? ? ? 0 ? ? ? ? ? x ? ? x 0 ? ? ? ? ? ? 0 ? ? ? ? 0 ? ? ? ? 0 x ? ? ? ? ? 0 ? ? ? ? ? ? ? 0 ? ? 0 ? ? 0 ? x x ? 0 0 ? x ? ? ? ? 0 ? 0 ? x ? 0 ? ? ? ? 0 ? x x 0 x 0 x 0 ? 0 0 0 0 ? ? ? 0 0 0 ? 0 ? 0 0 0 0 ? 0 ? 0 ? 0 ? 0 ? 0 ? x 0 ? ? ? ? ? ? ? ? ? x ? ? ? ? ? ? 0 ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 0 0 ? ? x ? ? ? ? ? ? ? ? 0 0 ? ? 0 ? ? ? ? ? ? 0 ? ? ? ? ? ? 0 ? 0 ? 0 ? ? ? ? ? ? ? ? 0 0 ? ? ? ? ? 0 0 0 0 ? ? ? ? ? ? ? ? ? 0 ? ? 0 x ? ? ? ? ? x 0 x 0 0 x 0 0 ? ? x 0 ? 0 0 0 0 0 0 0 0 ? ? ? x ? 0 x ? x x x x x 0 x x 0 0 ? ? 0 0 0 0 0 x x ? x 0 0 0 ? ? ? 0 0 ? ? ? x x ? x ? ? ? ? ? ? 0 0 ? x ? ? ? 0 0 0 0 0 ? 0 ? ? ? ? ? ? ? ? ? ? x ? ? x x x x ? ? ? ? ? x x ? x ? ? ? ? ? ? ? x ? ? ? ? x ? ? ? ? ? ? ? ? ? ? ? ? 0 ? ? ? 0 x ? ? x ? ? ? ? ? ? ? x x x x x ? ? x x ? ? x x ? ? x x x ? x x x x x x x ? x x x ? x x x ? x ? ? ? ? ? x x ? x ? ? ? ? ? ? ? ? ? x ? x 0 ? ? ? ? 0 ? ? ? x ? x ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? ? x x ? ? ? ? ? ? ? ? ? x 0 0 0 ? ? x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? 0 ? 0 0 0 0 0 0 ? 0 ? ? ? 0 0 ? ? ? ? ? ? ? ? ? ? ? ? x 0 0 x 0 ? ? 0 0 0 0 ? 0 ? 0 x x x 0 ? ? ? ? ? ? ? ? ? ? ? ? ? x x ? x ? ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 ? ? 0 ? ? 0 0 0 0 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
c:\users\user\appdata\local\temp\4e1378fe0bc043d882f057486abbff0c.xml Generic Write,Read Attributes

Windows API Usage

Category API
User Data Access
  • GetUserDefaultLocaleName
  • GetUserName
  • GetUserObjectInformation
Encryption Used
  • BCryptOpenAlgorithmProvider
  • CryptAcquireContext
Anti Debug
  • NtQuerySystemInformation
Other Suspicious
  • AdjustTokenPrivileges
Process Shell Execute
  • CreateProcess

Shell Command Execution

"schtasks.exe" /Create /TN "NextSink" /XML "C:\Users\Pisyxmzl\AppData\Local\Temp\4e1378fe0bc043d882f057486abbff0c.xml" /F

Trending

Most Viewed

Loading...