Malware

Generic.ServStart.A.05DA2309 (file analysis)

Malware Removal

The Generic.ServStart.A.05DA2309 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Generic.ServStart.A.05DA2309 virus can do?

  • Executable code extraction
  • Injection with CreateRemoteThread in a remote process
  • Creates RWX memory
  • Attempts to connect to a dead IP:Port (6 unique times)
  • Starts servers listening on 0.0.0.0:21
  • Expresses interest in specific running processes
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
  • A process created a hidden window
  • Drops a binary and executes it
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Tries to suspend Cuckoo threads to prevent logging of malicious activity
  • Code injection with CreateRemoteThread in a remote process
  • Crashed cuckoomon during analysis. Report this error to the Github repo.
  • A process attempted to delay the analysis task by a long amount of time.
  • Tries to unhook or modify Windows functions monitored by Cuckoo
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • Clears Windows events or logs
  • Creates a copy of itself
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

Related domains:

ilo.brenz.pl
supnewdmn.com
lianshangau.cc
513aushagou.cc
tvrstrynyvwstrtve.com
ant.trenz.pl
vvaonh.com
miajag.com
ayxdcd.com
btyexy.com
rtvwerjyuver.com
difuga.com
giismy.com
tobyyn.com
ufylyx.com
oxynap.com
wqerveybrstyhcerveantbe.com
rmineu.com
xofgoj.com
vsehiy.com
wjtxot.com
mahmek.com
didtjj.com
aeiviw.com
kvefxt.com
aajjzy.com
rreyzv.com
gadnkk.com
ayyywq.com
tsduzu.com
tdekcz.com
nqbibi.com
irmeiu.com
susyaa.com
fvbeaj.com
duitvg.com
emwggr.com
gyosoy.com
hbyftp.com
eihjuy.com
pubrru.com
xzypyp.com
buzrkw.com
nazesy.com
nbupha.com
gyiqae.com
lzmiao.com
iboajk.com
eynhhu.com
sipbuu.com
stcoum.com
auetoj.com
agewxo.com
kveioo.com
hpdoxm.com
biynfs.com
ooheze.com
yfeiio.com
kulvfs.com
yuaaif.com
yojklf.com
uuuukn.com
azoyrk.com
asoems.com
rplhia.com
hkiudd.com
pdvyju.com
euizfu.com
kganes.com
zuppak.com
eoaaat.com
udfzpw.com
lukpio.com
ztdadu.com
dibrpt.com
uopuzi.com
amkpie.com
soslwp.com
lphyop.com
qacnyt.com
czqywg.com
geuuys.com
ipmqgg.com
ybxjwb.com
fiahan.com
iupnue.com
rgssec.com
xxdnyj.com
etycom.com
ynvawu.com
qydejj.com
iuynyo.com
eevywm.com
rzxcgq.com
ybnjbd.com
nualyp.com

How to determine Generic.ServStart.A.05DA2309?


File Info:

crc32: 7C4BBDA5
md5: 23ff29e277ce2e65001613c8f79f96dd
name: 23FF29E277CE2E65001613C8F79F96DD.mlw
sha1: ed107fd3ad8ec62824dd313cb13c64fbcb1e4e55
sha256: a93c6922e26b1a9a9df022a5d5b85b11b84f2b83413f42851ac6ba0141228839
sha512: e4d6e456580f942bddc54b7345d0a11f02f398e97e2be32e1c6f46363b1d6c3551b23e6dd4575e5c1ab511fd665cf8b5f56bea2149adeb7ff67b7fd5c99578a0
ssdeep: 6144:4I0UZgbiyX3FZIRECe5iRA+MOZaWsqirkvOmGBN6IL1Q6xPue77l:lZgIRY5IA+PZasiLbMqQg2et
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: x7248x6743x6240x6709(C) 2015
InternalName: gy
FileVersion: 1, 0, 0, 1
CompanyName:
PrivateBuild:
LegalTrademarks:
Comments:
ProductName: gy
SpecialBuild:
ProductVersion: 1, 0, 0, 1
FileDescription: gy
OriginalFilename: gy.dat
Translation: 0x0804 0x04b0

Generic.ServStart.A.05DA2309 also known as:

BkavW32.Tmgrtext.PE
K7AntiVirusTrojan ( 0051b1671 )
Elasticmalicious (high confidence)
DrWebTrojan.AVKill.63055
CynetMalicious (score: 100)
CMCVirus.Win32.Ramit.1!O
CAT-QuickHealW32.Ramnit.BA
ALYacGeneric.ServStart.A.05DA2309
CylanceUnsafe
ZillyaVirus.Nimnul.Win32.1
SangforWin.Trojan.Ramnit-1847
CrowdStrikewin/malicious_confidence_100% (D)
K7GWTrojan ( 0051b1671 )
Cybereasonmalicious.277ce2
BaiduWin32.Virus.Nimnul.a
CyrenW32/Ramnit.B!Generic
SymantecW32.Ramnit.B!inf
ESET-NOD32Win32/Ramnit.H
ZonerTrojan.Win32.82649
APEXMalicious
AvastWin32:RmnDrp [Inf]
ClamAVWin.Trojan.Ramnit-1847
KasperskyVirus.Win32.Nimnul.a
BitDefenderGeneric.ServStart.A.05DA2309
NANO-AntivirusVirus.Win32.Nimnul.bqjjnb
ViRobotWin32.Nimnul.A
MicroWorld-eScanGeneric.ServStart.A.05DA2309
TencentVirus.Win32.Nimnul.f
Ad-AwareGeneric.ServStart.A.05DA2309
SophosML/PE-A + W32/Ramnit-A
ComodoVirus.Win32.Ramnit.K@37eb7u
BitDefenderThetaAI:FileInfector.9425D5100E
VIPREVirus.Win32.Ramnit.b (v)
TrendMicroPE_RAMNIT.DEN
McAfee-GW-EditionBehavesLike.Win32.Ramnit.fc
FireEyeGeneric.mg.23ff29e277ce2e65
EmsisoftGeneric.ServStart.A.05DA2309 (B)
SentinelOneStatic AI – Malicious PE
JiangminWin32/IRCNite.wi
AviraW32/Ramnit.C
eGambitUnsafe.AI_Score_100%
Antiy-AVLTrojan/Generic.ASVirus.1EB
MicrosoftVirus:Win32/Ramnit.J
GridinsoftTrojan.Win32.Malex.dd!n
ArcabitGeneric.ServStart.A.05DA2309
GDataWin32.Virus.Nimnul.A
TACHYONVirus/W32.Ramnit
AhnLab-V3Win32/Ramnit.G
Acronissuspicious
McAfeeW32/Ramnit.a
MAXmalware (ai score=84)
VBA32Virus.Win32.Nimnul.b
MalwarebytesNeshta.Virus.FileInfector.DDS
PandaW32/Cosmu.E
TrendMicro-HouseCallPE_RAMNIT.DEN
RisingMalware.Heuristic!ET#87% (RDMK:cmRtazppoX97wXZt4A1IaCMq+4tB)
YandexTrojan.GenAsa!rluJXE67ft0
IkarusBackdoor.Win32.Inject
MaxSecureVirus.Nimnul.A
FortinetW32/Ramnit.A
AVGWin32:RmnDrp [Inf]

How to remove Generic.ServStart.A.05DA2309?

Generic.ServStart.A.05DA2309 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment