Malware

Graftor.18265 removal guide

Malware Removal

The Graftor.18265 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Graftor.18265 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Authenticode signature is invalid
  • Anomalous binary characteristics

How to determine Graftor.18265?


File Info:

name: ED3875D8A1E04A6D985C.mlw
path: /opt/CAPEv2/storage/binaries/232dbb0b21a472fe581ce8bfeb728dd930f22fdd6efb9adbae84c7dc051e10ff
crc32: 87E4914F
md5: ed3875d8a1e04a6d985c477ab451cccb
sha1: 0ac69ef4e394fec2a2441c46a45f0ae5bcd77925
sha256: 232dbb0b21a472fe581ce8bfeb728dd930f22fdd6efb9adbae84c7dc051e10ff
sha512: 73dffa8e476312f943593d0c0daf4668e22fcbeaa1b34edd698932074c5f1f5f70a6ffb7d9fc404762d14df60bb4a9ddd2340f51be357c5daf6d79e3cec6715b
ssdeep: 49152:k8u5x2F6MspQfU6/z9L+mvaxcbdDXjXY5fdkVHhDXjXY5fdkVHH:ZUIopo/xLRy+DXjXYhehDXjXYheH
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T138C5235978E1206DE530E4B0D7A99D0EFE356724706A4C6CA4EBBE1A0C22567F9FC13C
sha3_384: 084ff5f880d6a51f3a0fc7e142e46d56e74885c9f941eeec6429ac01f4415d1870be5490504c2e16cb8aa35936a00108
ep_bytes: 68e8164000e8eeffffff000000000000
timestamp: 2017-11-26 17:50:21

Version Info:

Translation: 0x0409 0x04b0
CompanyName: amd
ProductName: Проект1
FileVersion: 1.00
ProductVersion: 1.00
InternalName: Stub
OriginalFilename: Stub.exe

Graftor.18265 also known as:

LionicTrojan.Win32.VB.kYPn
tehtrisGeneric.Malware
MicroWorld-eScanGen:Variant.Graftor.18265
FireEyeGeneric.mg.ed3875d8a1e04a6d
McAfeeArtemis!ED3875D8A1E0
CylanceUnsafe
VIPREGen:Variant.Graftor.18265
SangforSuspicious.Win32.Save.vb
K7AntiVirusTrojan ( 0003b3e91 )
AlibabaTrojan:Win32/VBKrypt.c6416cda
K7GWTrojan ( 0003b3e91 )
Cybereasonmalicious.8a1e04
CyrenW32/VBanti.A.gen!Eldorado
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Injector.DF
APEXMalicious
Paloaltogeneric.ml
CynetMalicious (score: 100)
KasperskyTrojan.Win32.VBKrypt.yonp
BitDefenderGen:Variant.Graftor.18265
NANO-AntivirusTrojan.Win32.VBKrypt.evnsxg
AvastFileRepPup [PUP]
TencentMalware.Win32.Gencirc.114950d0
Ad-AwareGen:Variant.Graftor.18265
EmsisoftGen:Variant.Graftor.18265 (B)
ComodoTrojWare.Win32.VB.fmmu@4aq4ot
DrWebTrojan.VbCrypt.250
McAfee-GW-EditionBehavesLike.Win32.Generic.vc
Trapminemalicious.moderate.ml.score
SophosML/PE-A + Mal/VB-Z
SentinelOneStatic AI – Malicious PE
GDataGen:Variant.Graftor.18265
JiangminTrojan.VBKrypt.enaf
AviraTR/Dropper.Gen
MAXmalware (ai score=98)
Antiy-AVLTrojan/Generic.ASMalwS.39
ArcabitTrojan.Graftor.D4759
MicrosoftPWS:Win32/Zbot!ml
GoogleDetected
AhnLab-V3Win-Trojan/FCN.140610.X1340
Acronissuspicious
VBA32Malware-Cryptor.VB.gen.1
ALYacGen:Variant.Graftor.18265
MalwarebytesMalware.Heuristic.1003
TrendMicro-HouseCallTROJ_GEN.R067C0RI722
RisingTrojan.Injector!1.6522 (CLASSIC)
YandexTrojan.GenAsa!2nVsLBtNFWw
IkarusTrojan-Dropper
MaxSecureTrojan.W32.VBKrypt.yonp
FortinetW32/VB.BKSJ!tr
BitDefenderThetaAI:Packer.CEC9F4C924
AVGFileRepPup [PUP]
PandaTrj/CI.A
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Graftor.18265?

Graftor.18265 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment