Categories: Malware

Chinky.2 information

The Chinky.2 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Chinky.2 virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (1 unique times)
  • A process attempted to delay the analysis task.
  • Expresses interest in specific running processes
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • Enumerates services, possibly for anti-virtualization
  • Mimics the file times of a Windows system file
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • Checks the system manufacturer, likely for anti-virtualization
  • Creates a slightly modified copy of itself
  • Anomalous binary characteristics
  • Attempts to modify Explorer settings to prevent hidden files from being displayed

Related domains:

ns1.player1253.com
ns1.videoall.net
ns1.mediashares.org

How to determine Chinky.2?


File Info:

crc32: 4A6025F4md5: ef5f5618eaba495ceb3fec9c92b23cbcname: EF5F5618EABA495CEB3FEC9C92B23CBC.mlwsha1: b7541ee7ffab4c3135e19a51ecb51afdd10e9924sha256: 81923aafebcffa5e1bcdb5e5f339cce3aea3a7b67f797916119ca26fa50373bbsha512: a1a7918de35e310cab2b96956d2d8f18aedc79795c3fd120e49cefc0be60b347369fa153e3b157478dadb93f73169fdf4aaad66f3284100abfcd027eadb21862ssdeep: 768:s6KRD9xRIHgWTU6xUdPMXndo7sZUNMRrY20KtF1eNbw1o+pGCV:ZkDL6mJdsndo6UNMyetF1qw1o+pGCVtype: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

Translation: 0x0409 0x04b0ProductVersion: 9.85InternalName: 1HWIIvFileVersion: 9.85OriginalFilename: 1HWIIv.exeProductName: 4HWIIv

Chinky.2 also known as:

Bkav W32.AIDetectVM.malware1
Elastic malicious (high confidence)
MicroWorld-eScan Gen:Variant.Chinky.2
FireEye Generic.mg.ef5f5618eaba495c
CAT-QuickHeal Trojan.VB.an3
ALYac Gen:Variant.Chinky.2
Cylance Unsafe
VIPRE Trojan.Win32.Vobfus.a (v)
K7AntiVirus Trojan-Downloader ( 001e96331 )
BitDefender Gen:Variant.Chinky.2
K7GW Trojan-Downloader ( 001e96331 )
Cybereason malicious.8eaba4
BitDefenderTheta AI:Packer.C4BA3A1320
Cyren W32/VB.BT.gen!Eldorado
Symantec W32.Changeup!gen9
TotalDefense Win32/Vobfus.F!generic
APEX Malicious
ClamAV Win.Trojan.VB-1619
Kaspersky Worm.Win32.VBNA.bsdm
NANO-Antivirus Trojan.Win32.VB.covkxd
ViRobot Worm.Win32.A.VBNA.61440.DH
Ad-Aware Gen:Variant.Chinky.2
TACHYON Worm/W32.VB-VBNA.61440.E
Comodo TrojWare.Win32.VB.X@2i170u
DrWeb BackDoor.Blackshades.17
TrendMicro WORM_VOBFUS.SMIA
McAfee-GW-Edition BehavesLike.Win32.VBObfus.kt
Sophos ML/PE-A + Troj/Vobfus-G
Ikarus Trojan.ATRAPS
Jiangmin Worm/VBNA.gyjg
Avira TR/Dropper.Gen
Antiy-AVL Worm/Win32.WBNA.gen
Arcabit Trojan.Chinky.2
SUPERAntiSpyware Trojan.Agent/Gen-Vobfus
ZoneAlarm Worm.Win32.VBNA.bsdm
Cynet Malicious (score: 100)
AhnLab-V3 Win-Trojan/Chinky3.Gen
Acronis suspicious
VBA32 SScope.Trojan.VBRA.3182
MAX malware (ai score=83)
Malwarebytes Vobfus.Worm.Evasion.DDS
ESET-NOD32 Win32/AutoRun.VB.XV
TrendMicro-HouseCall WORM_VOBFUS.SMIA
Rising Trojan.Win32.VBCode.cex (CLASSIC)
Yandex Trojan.GenAsa!5qb7GwfQnNc
SentinelOne Static AI – Malicious PE – Worm
eGambit Unsafe.AI_Score_94%
Fortinet W32/VBKrypt.AGW!tr
Panda W32/Vobfus.FM
CrowdStrike win/malicious_confidence_100% (D)
Qihoo-360 HEUR/QVM03.0.0510.Malware.Gen

How to remove Chinky.2?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

MSIL/GenKryptik.GXIZ information

The MSIL/GenKryptik.GXIZ is considered dangerous by lots of security experts. When this infection is active,…

3 weeks ago

Malware.AI.2789448175 (file analysis)

The Malware.AI.2789448175 is considered dangerous by lots of security experts. When this infection is active,…

3 weeks ago

Jalapeno.1878 removal instruction

The Jalapeno.1878 is considered dangerous by lots of security experts. When this infection is active,…

3 weeks ago

What is “Trojan.Heur3.LPT.YmKfaKBcBekib”?

The Trojan.Heur3.LPT.YmKfaKBcBekib is considered dangerous by lots of security experts. When this infection is active,…

3 weeks ago

How to remove “Worm.Win32.Vobfus.exmt”?

The Worm.Win32.Vobfus.exmt is considered dangerous by lots of security experts. When this infection is active,…

3 weeks ago

About “TrojanDownloader:Win32/Beebone.JO” infection

The TrojanDownloader:Win32/Beebone.JO is considered dangerous by lots of security experts. When this infection is active,…

3 weeks ago