Backdoor

Backdoor.MSIL.Crysan.dfc removal guide

Malware Removal

The Backdoor.MSIL.Crysan.dfc is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor.MSIL.Crysan.dfc virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • Authenticode signature is invalid
  • A scripting utility was executed
  • Uses Windows utilities for basic functionality
  • Deletes its original binary from disk
  • Created a process from a suspicious location
  • Collects and encrypts information about the computer likely to send to C2 server
  • Creates a hidden or system file
  • CAPE detected the AsyncRat malware family
  • Anomalous binary characteristics

Related domains:

wpad.local-net

How to determine Backdoor.MSIL.Crysan.dfc?


File Info:

name: 401F3920A22DA2CAC6BD.mlw
path: /opt/CAPEv2/storage/binaries/4bc75f5cba453e23878227e39cc5d32bb350fa6d557eadaae2c47810c707a4e2
crc32: 6F3756A8
md5: 401f3920a22da2cac6bdd36beb063fae
sha1: 196555953406f663feda1da7c22a2ab08b88bc12
sha256: 4bc75f5cba453e23878227e39cc5d32bb350fa6d557eadaae2c47810c707a4e2
sha512: 9dc68df903b7aae72bd09d5da929cc442f9fdf87c3c628f0234acc5d9b6f38aa36a82b8c8a6515c17d81bda8708b0ea8b05154b04ddd030b6fb51e5847e61ef3
ssdeep: 24576:FCOZcjE2Uo8E0lT7nRM5KI9ILmidD/MVvQF4kp2tzgWQdNlufsWXh2n:auNlaLAEQbdnwXw
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1958533A69A40C38AD6C4487915B7F2C9CEFE8C0949C5818F994E240F7CB1E4DF656CFA
sha3_384: 83b1e3d63d08b5c4d92d475639ff202c4038e96944f57257cf1d3091c671d35646017ad084162bce08631bb4302cc216
ep_bytes: e8351f19006a00ff15a4505900c3ee00
timestamp: 2021-11-22 11:00:38

Version Info:

FileDescription: Process Hacker
ProductName: Process Hacker
FileVersion: 2.39.0.124
ProductVersion: 2.39.0.124
LegalCopyright: Licensed under the GNU GPL, v3.
OriginalFilename: ProcessHacker.exe
Translation: 0x0409 0x0000

Backdoor.MSIL.Crysan.dfc also known as:

BkavW32.AIDetect.malware1
LionicTrojan.MSIL.LightStone.m!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Razy.931651
FireEyeGeneric.mg.401f3920a22da2ca
McAfeeArtemis!401F3920A22D
CylanceUnsafe
K7AntiVirusTrojan ( 005825481 )
AlibabaBackdoor:Win32/Crysan.4c6d02b1
K7GWTrojan ( 005825481 )
Cybereasonmalicious.0a22da
ArcabitTrojan.Razy.DE3743
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/GenKryptik.FKNU
APEXMalicious
Paloaltogeneric.ml
KasperskyBackdoor.MSIL.Crysan.dfc
BitDefenderGen:Variant.Razy.931651
AvastWin32:Trojan-gen
TencentWin32.Trojan.Razy.Oyex
Ad-AwareGen:Variant.Razy.931651
EmsisoftGen:Variant.Razy.931651 (B)
DrWebTrojan.Siggen15.50290
TrendMicroTROJ_GEN.R002C0DKN21
McAfee-GW-EditionBehavesLike.Win32.Generic.th
SophosMal/Generic-S
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_94%
AviraHEUR/AGEN.1119113
GridinsoftRansom.Win32.Wacatac.sa
MicrosoftVirTool:Win32/Pucrpt.A!MTB
GDataGen:Variant.Razy.931651
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win.Generic.R442274
BitDefenderThetaAI:Packer.A6934CBE1F
ALYacGen:Variant.Razy.931651
MAXmalware (ai score=83)
VBA32BScope.Trojan.Wacatac
MalwarebytesTrojan.Dropper
TrendMicro-HouseCallTROJ_GEN.R002C0DKN21
YandexTrojan.GenKryptik!MYDpxUUsIek
IkarusTrojan.Win32.Krypt
FortinetW32/Emotet.5C62!tr
AVGWin32:Trojan-gen
PandaTrj/GdSda.A
CrowdStrikewin/malicious_confidence_70% (W)

How to remove Backdoor.MSIL.Crysan.dfc?

Backdoor.MSIL.Crysan.dfc removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment