Malware

Fragtor.30968 malicious file

Malware Removal

The Fragtor.30968 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Fragtor.30968 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Deletes its original binary from disk
  • Created a process from a suspicious location
  • Creates a copy of itself

How to determine Fragtor.30968?


File Info:

name: ECE21AA1702DD9665950.mlw
path: /opt/CAPEv2/storage/binaries/952e70305bff1164fd41fcd78249eaacf4734b5e3ca8e29b26538bd349d01365
crc32: 132C964A
md5: ece21aa1702dd96659501dc3d3abb5e0
sha1: 9d2e11c5305620cca7fe395a18889d91cc7a59e9
sha256: 952e70305bff1164fd41fcd78249eaacf4734b5e3ca8e29b26538bd349d01365
sha512: 4aa41a958b0bc29aa59bc467d7f729df498cc9f22c831d90dcf899a70e1ea08b11751a0ef4adea87082174b99c29ce7825e863549edaae8a97c25dfd19b6cbeb
ssdeep: 12288:kqk0GcE3v6T6rapGGRAJk1XTH27oqxJPKHJw7QhxtjG8LOKVOOHUB6aqOOzvPTrv:k5p/6Tv81Jk5t4VKfxrLOKVOVsPTSO
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T19D0533656441802BFC7EE9312293CDCB12D9FD7A865FADD8ADEBC8AE5001640FD82DD4
sha3_384: 06a1a849c7af709df8ea5980a78684e8e071707ab409d2899bcc29d2f0c17d47cb796a754ef4933e122c4f487a33e3fe
ep_bytes: b800000000534e5921f601fe5101ffbe
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Fragtor.30968 also known as:

Elasticmalicious (high confidence)
DrWebTrojan.Packed2.43250
MicroWorld-eScanGen:Variant.Fragtor.30968
FireEyeGeneric.mg.ece21aa1702dd966
ALYacGen:Variant.Fragtor.30968
MalwarebytesTrojan.Crypt.UPX
ZillyaTrojan.Kryptik.Win32.3591117
SangforTrojan.Win32.Kryptik.HITO
K7AntiVirusTrojan ( 0058c5ff1 )
AlibabaMalware:Win32/km_280b22.None
K7GWTrojan ( 005762bf1 )
Cybereasonmalicious.530562
BitDefenderThetaGen:NN.ZexaF.34182.XmW@aiUH@uh
CyrenW32/CoinMiner.CQ.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.HITO
TrendMicro-HouseCallTROJ_GEN.R002C0DJ221
Paloaltogeneric.ml
ClamAVWin.Trojan.Coinminerx-9891136-0
Kasperskynot-a-virus:HEUR:RiskTool.Win32.BitCoinMiner.vho
BitDefenderGen:Variant.Fragtor.30968
NANO-AntivirusRiskware.Win32.BitCoinMiner.imdsbw
AvastWin32:CoinminerX-gen [Trj]
TencentTrojan.Win32.Coinminer.yi
ComodoPacked.Win32.MUPX.Gen@24tbus
VIPRETrojan.Win32.Generic!BT
TrendMicroTROJ_GEN.R002C0DJ221
EmsisoftGen:Variant.Fragtor.30968 (B)
IkarusTrojan.Win32.Injector
JiangminRiskTool.BitCoinMiner.xhw
AviraTR/Crypt.ULPM.Gen
MAXmalware (ai score=83)
Antiy-AVLTrojan/Generic.ASBOL.C68C
MicrosoftTrojan:Win32/Injector.RAQ!MTB
GDataGen:Variant.Fragtor.30968
CynetMalicious (score: 100)
AhnLab-V3Malware/Gen.RL_Reputation.R366157
McAfeeGenericRXAA-FA!ECE21AA1702D
VBA32Trojan.Packed
APEXMalicious
RisingTrojan.Kryptik!1.D238 (CLOUD)
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_99%
FortinetW32/Kryptik.EAHK!tr
AVGWin32:CoinminerX-gen [Trj]
PandaTrj/Genetic.gen
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Fragtor.30968?

Fragtor.30968 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment