Malware

How to remove “Fragtor.108238 (B)”?

Malware Removal

The Fragtor.108238 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Fragtor.108238 (B) virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Executed a command line with /C or /R argument to terminate command shell on completion which can be used to hide execution
  • Dynamic (imported) function loading detected
  • Network anomalies occured during the analysis.
  • Reads data out of its own binary image
  • A process created a hidden window
  • Drops a binary and executes it
  • Authenticode signature is invalid
  • A ping command was executed with the -n argument possibly to delay analysis
  • Uses Windows utilities for basic functionality
  • Created a process from a suspicious location
  • Uses suspicious command line tools or Windows utilities

How to determine Fragtor.108238 (B)?


File Info:

name: 1B8B162ABA27E6F71540.mlw
path: /opt/CAPEv2/storage/binaries/d257cded22e25c75e048f37b3cc4923e7bbd76b35ababbef9be4407f8940cea4
crc32: 0C729631
md5: 1b8b162aba27e6f715408fdc667c0746
sha1: 0bd97abf588d198585a7a7f6bbb610d24bcb8448
sha256: d257cded22e25c75e048f37b3cc4923e7bbd76b35ababbef9be4407f8940cea4
sha512: a29f45ca30b81832f5923820f6c4a7251ea9de2c1b62ff71fd59306b1499d748cce09a203c3f1e1b9d8563f229bdd5d2401416787a19f9309d63762adcb4944a
ssdeep: 384:5WSyZQ2Ux96eJr09RXjXz7XjCWwqK8Wzz8WW5bIwHd8mC/TWZXSJBG7zOgqkKuo0:ISyMb6f9xjXvKBBW5bdnjXSbzTuo0
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T161C2AF83FA904D75EE50063126B15CB482BFFCA1E6B1C6D293D0EA971DF1428E6197CD
sha3_384: 51c4067579013a22c836574403a94dcb7edfdafa1496ffa869a793310a7a4702e9767309086d1d0ff4f5810d8a73664f
ep_bytes: e8b1020000e974feffff558becff7508
timestamp: 2020-12-13 23:46:04

Version Info:

0: [No Data]

Fragtor.108238 (B) also known as:

MicroWorld-eScanGen:Variant.Fragtor.108238
FireEyeGeneric.mg.1b8b162aba27e6f7
McAfeeGenericRXNV-VM!1B8B162ABA27
CylanceUnsafe
VIPREGen:Variant.Fragtor.108238
K7AntiVirusPassword-Stealer ( 005937271 )
K7GWPassword-Stealer ( 005937271 )
Cybereasonmalicious.aba27e
CyrenW32/Agent.ENB.gen!Eldorado
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/PSW.Agent.OOO
APEXMalicious
ClamAVWin.Malware.Fugrafa-9950512-0
KasperskyHEUR:Trojan.Win32.SelfDel.vho
BitDefenderGen:Variant.Fragtor.108238
NANO-AntivirusTrojan.Win32.SelfDel.jpepdv
AvastWin32:Malware-gen
TencentTrojan.Win32.Selfdel.xb
Ad-AwareGen:Variant.Fragtor.108238
TACHYONTrojan/W32.Fugrafa.26112
EmsisoftGen:Variant.Fragtor.108238 (B)
DrWebTrojan.MulDrop20.10627
ZillyaTrojan.SelfDel.Win32.65008
McAfee-GW-EditionBehavesLike.Win32.Generic.mh
SophosTroj/PWS-CMJ
IkarusTrojan.DelFiles
GDataGen:Variant.Fragtor.108238
JiangminTrojan.Selfdel.rft
AviraHEUR/AGEN.1234650
ArcabitTrojan.Fragtor.D1A6CE
ZoneAlarmHEUR:Trojan.Win32.SelfDel.vho
MicrosoftTrojan:Win32/Wacatac.B!ml
CynetMalicious (score: 100)
AhnLab-V3Malware/Win.Reputation.R496203
Acronissuspicious
ALYacGen:Variant.Fragtor.108238
MAXmalware (ai score=83)
VBA32BScope.Trojan.Occamy
MalwarebytesMalware.AI.2397151589
RisingStealer.Agent!1.DE3E (CLASSIC)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/SelfDef.26C0!tr
AVGWin32:Malware-gen
PandaTrj/Genetic.gen

How to remove Fragtor.108238 (B)?

Fragtor.108238 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment