Categories: Trojan

What is “Crypt.Trojan.Malicious.DDS”?

The Crypt.Trojan.Malicious.DDS is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Crypt.Trojan.Malicious.DDS virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Presents an Authenticode digital signature
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Arabic (Saudi Arabia)
  • The binary likely contains encrypted or compressed data.
  • Executable file is packed/obfuscated with Themida
  • Authenticode signature is invalid
  • Checks for the presence of known windows from debuggers and forensic tools
  • Checks the version of Bios, possibly for anti-virtualization
  • Detects VirtualBox through the presence of a registry key
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Crypt.Trojan.Malicious.DDS?


File Info:

name: D83CC585AC9329D79F29.mlwpath: /opt/CAPEv2/storage/binaries/b993ca2a752e9bd918f76db3cff5b987977821bd5874c3d867ad16d82156682fcrc32: 4876C549md5: d83cc585ac9329d79f29bbf45b25cccbsha1: d8b035f84e304ea9a46405ebf9eb7bd726905ecesha256: b993ca2a752e9bd918f76db3cff5b987977821bd5874c3d867ad16d82156682fsha512: f85a02a29cb6731a18eefff8077e7bde9f7c86da8fa1f9e77bd88c2c92345548798335bd9275c67a4d371dda05d5cc2b850ed29c6df4e194dcb91d3e346c6abdssdeep: 98304:Al1rwhciArkfIDpQz3RuCiDwTr7E7T5cl21HL2OMCD:21rw+JDpQFMcsRPrDDtype: PE32 executable (GUI) Intel 80386, for MS Windowstlsh: T1D326BFF03E0DD7DFF87A05B5B50ACA47996463E94204D60BFBAA387C45B2D520ECA760sha3_384: 8ec446fbd0dd17bf4b529304caea0a02eac248c8d22fb7c29d2a8e33f126d873679c015884d853a94164a355efed0190ep_bytes: 55e9eb34fdff5de984fc0000e9376700timestamp: 2022-10-25 11:50:59

Version Info:

0: [No Data]

Crypt.Trojan.Malicious.DDS also known as:

Lionic Trojan.Win32.Stealer.12!c
Elastic malicious (high confidence)
MicroWorld-eScan Gen:Variant.Fragtor.156077
McAfee Artemis!D83CC585AC93
Malwarebytes Crypt.Trojan.Malicious.DDS
VIPRE Gen:Variant.Fragtor.156077
Sangfor Spyware.Win32.Fragtor.Vrkn
K7AntiVirus Trojan ( 0059a32c1 )
Alibaba TrojanSpy:Win32/Stealer.a7199ff8
K7GW Trojan ( 0059a32c1 )
CrowdStrike win/malicious_confidence_90% (W)
VirIT Trojan.Win32.Genus.LZJ
Cyren W32/ABRisk.LOOW-3702
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/GenCBL.CXY
APEX Malicious
Paloalto generic.ml
Cynet Malicious (score: 99)
Kaspersky Trojan-Spy.Win32.Stealer.cwnh
BitDefender Gen:Variant.Fragtor.156077
NANO-Antivirus Trojan.Win32.Stealer.jtezam
Avast FileRepMalware
Tencent Win32.Trojan.FalseSign.Hplw
Sophos Generic ML PUA (PUA)
DrWeb Trojan.Inject4.45811
TrendMicro Trojan.Win32.PRIVATELOADER.YXCJ1Z
McAfee-GW-Edition Artemis!Trojan
Trapmine malicious.high.ml.score
FireEye Gen:Variant.Fragtor.156077
Emsisoft Gen:Variant.Fragtor.156077 (B)
GData Gen:Variant.Fragtor.156077
Webroot W32.Trojan.Gen
Avira TR/AD.Nekark.itdaj
MAX malware (ai score=84)
Antiy-AVL Trojan[Spy]/Win32.Stealer
Xcitium Malware@#2cdd19b81ewn5
Arcabit Trojan.Fragtor.D261AD
ViRobot Trojan.Win32.Z.Stealer.4835176
Microsoft Trojan:Win32/Wacatac.B!ml
Google Detected
VBA32 BScope.Trojan.Scar
ALYac Gen:Variant.Fragtor.156077
TrendMicro-HouseCall Trojan.Win32.PRIVATELOADER.YXCJ1Z
Rising Stealer.Agent!8.C2 (CLOUD)
Yandex Trojan.GenCBL!J2m3UIV9hoQ
Ikarus Trojan.Win32.Generic
MaxSecure Trojan.Malware.194532316.susgen
Fortinet W32/Malicious_Behavior.VEX
BitDefenderTheta Gen:NN.ZexaCO.36308.@xY@aegcJLcG
AVG FileRepMalware
Cybereason malicious.84e304

How to remove Crypt.Trojan.Malicious.DDS?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

MSIL/GenKryptik.GXIZ information

The MSIL/GenKryptik.GXIZ is considered dangerous by lots of security experts. When this infection is active,…

1 week ago

Malware.AI.2789448175 (file analysis)

The Malware.AI.2789448175 is considered dangerous by lots of security experts. When this infection is active,…

1 week ago

Jalapeno.1878 removal instruction

The Jalapeno.1878 is considered dangerous by lots of security experts. When this infection is active,…

1 week ago

What is “Trojan.Heur3.LPT.YmKfaKBcBekib”?

The Trojan.Heur3.LPT.YmKfaKBcBekib is considered dangerous by lots of security experts. When this infection is active,…

1 week ago

How to remove “Worm.Win32.Vobfus.exmt”?

The Worm.Win32.Vobfus.exmt is considered dangerous by lots of security experts. When this infection is active,…

1 week ago

About “TrojanDownloader:Win32/Beebone.JO” infection

The TrojanDownloader:Win32/Beebone.JO is considered dangerous by lots of security experts. When this infection is active,…

1 week ago