Malware

Graftor.406864 (B) malicious file

Malware Removal

The Graftor.406864 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Graftor.406864 (B) virus can do?

  • Attempts to connect to a dead IP:Port (1 unique times)
  • A process attempted to delay the analysis task.
  • Reads data out of its own binary image
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX

Related domains:

ecosystem.unvocal.ru

How to determine Graftor.406864 (B)?


File Info:

crc32: 919AE7CA
md5: 8f977331dcec1d9fb811a40ba0f60432
name: 8F977331DCEC1D9FB811A40BA0F60432.mlw
sha1: a08d3daac18bf55a1384ca9bfebd9e8f6e6385fd
sha256: f8db3bb9a0f9905eef07aa09610ca8e4669c236b0f96677ae5187648bbd81ad1
sha512: 9a47e184f628e447a08c3e22082f3ce9048c3d617bd2cd05141a5de1aed532c710ea488d0eac642be2cfb12e5b2030a8bd9dbaac7640ae47f8273ae175e0d69a
ssdeep: 3072:uUJeirXV0hK4aKd5jOip370e9hvm+SGglu1:uUvlCXaw1pZ9hZyu
type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed

Version Info:

LegalCopyright: iForce
InternalName: iForce
FileVersion: 105.40.30.21
CompanyName: iForce
ProductName: iForce
ProductVersion: 120.0.0.1
FileDescription: iForce
OriginalFilename: iForce
Translation: 0x0400 0x04b0

Graftor.406864 (B) also known as:

Elasticmalicious (high confidence)
DrWebTrojan.DownLoader25.29230
MicroWorld-eScanGen:Variant.Graftor.406864
FireEyeGeneric.mg.8f977331dcec1d9f
CAT-QuickHealAdware.Dataric.A5
Qihoo-360HEUR/QVM11.1.7AC5.Malware.Gen
ALYacGen:Variant.Graftor.406864
CylanceUnsafe
VIPRETrojan.Win32.Generic!BT
AegisLabTrojan.Win32.Generic.a!c
SangforMalware
K7AntiVirusTrojan-Downloader ( 00515cbf1 )
BitDefenderGen:Variant.Graftor.406864
K7GWTrojan-Downloader ( 00515cbf1 )
CrowdStrikewin/malicious_confidence_100% (D)
BitDefenderThetaAI:Packer.AF74DDCC1F
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastWin32:Malware-gen
ClamAVWin.Downloader.Tovkater-7697312-0
KasperskyHEUR:Trojan-Downloader.Win32.Generic
NANO-AntivirusTrojan.Win32.Tovkater.esjuxt
TencentMalware.Win32.Gencirc.10b0ee30
Ad-AwareGen:Variant.Graftor.406864
EmsisoftGen:Variant.Graftor.406864 (B)
ComodoTrojWare.Win32.TrojanDownloader.Tovkater.HT@7ebfmm
F-SecureAdware.ADWARE/InstMonster.Gen7
ZillyaDownloader.Tovkater.Win32.358
TrendMicroHT_TOVKATER_GI080228.UVPM
McAfee-GW-EditionBehavesLike.Win32.Generic.cc
SophosMal/Generic-S
SentinelOneStatic AI – Suspicious PE
JiangminTrojan.Gofot.fz
AviraADWARE/InstMonster.Gen7
MAXmalware (ai score=99)
Antiy-AVLTrojan[Downloader]/Win32.AGeneric
MicrosoftSoftwareBundler:Win32/InstallMonster
ArcabitTrojan.Graftor.D63550
ZoneAlarmHEUR:Trojan-Downloader.Win32.Generic
GDataGen:Variant.Graftor.406864
CynetMalicious (score: 90)
AhnLab-V3PUP/Win32.Agent.R208463
McAfeeArtemis!8F977331DCEC
VBA32Trojan.Bitrep
MalwarebytesAdware.InstallMonster
PandaTrj/Genetic.gen
ESET-NOD32a variant of Win32/TrojanDownloader.Tovkater.CQ
TrendMicro-HouseCallHT_TOVKATER_GI080228.UVPM
RisingDownloader.Tovkater!8.E5CE (CLOUD)
YandexTrojan.GenAsa!51HERDTrEqs
IkarusTrojan-Downloader.Win32.Tovkater
eGambitUnsafe.AI_Score_99%
FortinetW32/Tovkater.CQ!tr
AVGWin32:Malware-gen
Paloaltogeneric.ml

How to remove Graftor.406864 (B)?

Graftor.406864 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment