Malware

Application.Strictor.127482 (file analysis)

Malware Removal

The Application.Strictor.127482 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Application.Strictor.127482 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Anomalous file deletion behavior detected (10+)
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Deletes executed files from disk

How to determine Application.Strictor.127482?


File Info:

name: A6B62BCA99284E1BA96D.mlw
path: /opt/CAPEv2/storage/binaries/30336febb714ac6b2c44e2ae8bebb1fd5321cfcffc7c2df1db36ca48e1534131
crc32: 378A8C67
md5: a6b62bca99284e1ba96d8c41621f3b66
sha1: 59eadd3faf7814d7f0fb2fab6b2c522ed9af8367
sha256: 30336febb714ac6b2c44e2ae8bebb1fd5321cfcffc7c2df1db36ca48e1534131
sha512: a319f1365c8fa77fe5e578e715be465416aede1f458f7bf9f2f3c63b1011d6418c166db93dd9f00b2b04bbb0eec7d7939a3bf0b1786ddf24d5c42bb062991c15
ssdeep: 24576:LQiFwl39ienMisLrMm40KpTKUa90UCOTkqGKR:L9s39iZiHpTS90UCOTMKR
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T17D452326B491C9B6E941CB352CEF9A88A637FD505E7A1049B6CD4ECC3F37720815B326
sha3_384: 94dded56eb30671a7f5effa456520308886ff5ab7c6ea6bf3a85266ef5e20bcc2761567a240d35691efc32ba7072afcd
ep_bytes: 558bec83c4c453565733c08945f08945
timestamp: 1992-06-19 22:22:17

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName: KLFSoft Co., Ltd.
FileDescription: Keylogger Free Setup
FileVersion:
LegalCopyright:
ProductName: Keylogger Free
ProductVersion:
Translation: 0x0000 0x04b0

Application.Strictor.127482 also known as:

LionicTrojan.Win32.Strictor.4!c
MicroWorld-eScanGen:Variant.Application.Strictor.127482
ALYacGen:Variant.Application.Strictor.127482
CylanceUnsafe
VIPREGen:Variant.Application.Strictor.127482
AlibabaTrojanSpy:Win32/Generic.62013297
CrowdStrikewin/grayware_confidence_70% (W)
ESET-NOD32a variant of Win32/Spy.Delf.QAL
BitDefenderGen:Variant.Application.Strictor.127482
NANO-AntivirusTrojan.Win32.Rundas.eifqoz
EmsisoftApplication.Downloader (A)
ComodoMalware@#24ck8edf0pwfs
ZillyaTrojan.ZbotCRTD.Win32.6935
FireEyeGen:Variant.Application.Strictor.127482
IkarusPUA.BundleLoader
GDataGen:Variant.Application.Strictor.127482
WebrootSystem.Monitor.Keylogger.Free
Antiy-AVLTrojan/Generic.ASMalwS.3C54
ArcabitTrojan.Application.Strictor.D1F1FA
MicrosoftPUABundler:Win32/CandyOpen
VBA32Trojan.InstallCore
MalwarebytesRiskWare.KeyLogger
APEXMalicious
RisingSpyware.Delf!8.12D (CLOUD)
MAXmalware (ai score=89)
MaxSecureTrojan.Malware.10694163.susgen
FortinetW32/Delf.QAL!tr.spy
Cybereasonmalicious.a99284

How to remove Application.Strictor.127482?

Application.Strictor.127482 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment