Malware

Fragtor.31547 (B) malicious file

Malware Removal

The Fragtor.31547 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Fragtor.31547 (B) virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Scheduled file move on reboot detected
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Deletes its original binary from disk
  • Created a process from a suspicious location
  • Creates a copy of itself

How to determine Fragtor.31547 (B)?


File Info:

name: 3941029CA4953D587A8F.mlw
path: /opt/CAPEv2/storage/binaries/4df15e847e18c61f96e0a556885434729c44a27bd1f81f3ec810c45e7e40c25f
crc32: D2989AE2
md5: 3941029ca4953d587a8fa87392ae298d
sha1: 41de452cd5c53a0d6a559e6bcccdfe4d4825210b
sha256: 4df15e847e18c61f96e0a556885434729c44a27bd1f81f3ec810c45e7e40c25f
sha512: 730ab0f976c433c9f0ee449e8260050d926908377b524aee05e1d28fa3c5219e8388c88152509953d7aa44e14c3d658e06f7f324cb4cb1a3f8433939d9a00ab6
ssdeep: 24576:lpI6Pifo2yLC+Do8rGBabqfa/cX3y1ptJ1P2oIjiqtIsgENYEO:fI6ifo2tgGBecC1pbYi7sg
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T16375338796969407D2BE463D23E754BAC1F6011332D01604FFDA7839F279AA77BB2348
sha3_384: 933245ac02b0bea3d7cae91c71bf79782681712bcec6b2860b138472cf9385b8cafd1e87a56363e922d5ff70e3ae4b61
ep_bytes: ba000000005729c0685e6cbfd08b3424
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Fragtor.31547 (B) also known as:

BkavW32.AIDetect.malware2
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Fragtor.31547
FireEyeGen:Variant.Fragtor.31547
McAfeeGenericRXQM-KF!3941029CA495
CylanceUnsafe
SangforSuspicious.Win32.Save.a
K7GWTrojan ( 0057ffc71 )
K7AntiVirusTrojan ( 0057ffc71 )
CyrenW32/CoinMiner.CQ.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.HITO
APEXMalicious
Kasperskynot-a-virus:HEUR:RiskTool.Win32.BitCoinMiner.vho
BitDefenderGen:Variant.Fragtor.31547
AvastWin32:CoinminerX-gen [Trj]
TencentTrojan.Win32.Coinminer.yi
Ad-AwareGen:Variant.Fragtor.31547
EmsisoftGen:Variant.Fragtor.31547 (B)
ComodoPacked.Win32.MUPX.Gen@24tbus
DrWebTrojan.Packed2.43250
McAfee-GW-EditionBehavesLike.Win32.Generic.tc
SophosGeneric ML PUA (PUA)
SentinelOneStatic AI – Malicious PE
GDataGen:Variant.Fragtor.31547
JiangminTrojan.Copak.bcfj
eGambitUnsafe.AI_Score_74%
AviraTR/Crypt.ULPM.Gen
Antiy-AVLTrojan/Generic.ASBOL.C68C
MicrosoftTrojan:Win32/Injector.RAQ!MTB
CynetMalicious (score: 100)
AhnLab-V3Malware/Gen.Reputation.C4300831
BitDefenderThetaGen:NN.ZexaF.34294.InZ@aKhZlfc
ALYacGen:Variant.Fragtor.31547
MAXmalware (ai score=86)
VBA32Trojan.Packed
MalwarebytesTrojan.Crypt
RisingTrojan.Kryptik!1.D12D (CLASSIC)
YandexTrojan.Kryptik!Kw7gfQv8bUA
IkarusTrojan.Win32.Injector
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.EAHK!tr
AVGWin32:CoinminerX-gen [Trj]
PandaTrj/Genetic.gen

How to remove Fragtor.31547 (B)?

Fragtor.31547 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment