Malware

How to remove “Graftor.855703”?

Malware Removal

The Graftor.855703 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Graftor.855703 virus can do?

  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Executable code extraction
  • Injection with CreateRemoteThread in a remote process
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • Starts servers listening on 127.0.0.1:0
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • Looks up the external IP address
  • Executed a process and injected code into it, probably while unpacking
  • Tries to unhook or modify Windows functions monitored by Cuckoo
  • Exhibits behavior characteristics of HawkEye keylogger.
  • Steals private information from local Internet browsers
  • Installs itself for autorun at Windows startup
  • Creates a copy of itself
  • Attempts to access Bitcoin/ALTCoin wallets
  • Harvests information related to installed instant messenger clients
  • Harvests information related to installed mail clients
  • Collects information to fingerprint the system
  • Anomalous binary characteristics
  • Attempts to modify Explorer settings to prevent hidden files from being displayed

Related domains:

z.whorecord.xyz
a.tomx.xyz
whatismyipaddress.com

How to determine Graftor.855703?


File Info:

crc32: 01446C00
md5: b13e8fdd2c9c2a214a30747b7da3c4b7
name: B13E8FDD2C9C2A214A30747B7DA3C4B7.mlw
sha1: c3932519c0d77af70134d46688e4ebb7cb528fa5
sha256: d7cb36fcee26269eff4699a98d35dd74321ba6e5b1071e9b43a1f60737662a84
sha512: a50762f8b31c74ac9d083ec3cf3635c2b386e15ee3b77cbd9f087260e32bd203d03db619388d3c6b8be5ad455f01c5e810250e129ef71640ff6576a043618413
ssdeep: 24576:orObPMiQ/H7WcKrrrWrwx9GRMQPohBQYp0h0Xts/7p:o7r/berWaGloHQYah09gd
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Graftor.855703 also known as:

BkavW32.AIDetectVM.malware2
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Graftor.855703
FireEyeGeneric.mg.b13e8fdd2c9c2a21
CAT-QuickHealTrojan.DriveHide.VN8
McAfeePWS-FCRZ!B13E8FDD2C9C
SangforMalware
BitDefenderGen:Variant.Graftor.855703
Cybereasonmalicious.9c0d77
BitDefenderThetaGen:NN.ZelphiF.34590.hHW@ae2bJJbi
SymantecTrojan.Gen.2
APEXMalicious
AvastWin32:Trojan-gen
Ad-AwareGen:Variant.Graftor.855703
DrWebTrojan.Siggen10.62464
InvinceaGeneric ML PUA (PUA)
McAfee-GW-EditionBehavesLike.Win32.Fareit.th
EmsisoftGen:Variant.Graftor.855703 (B)
SentinelOneStatic AI – Suspicious PE
MaxSecureTrojan.Malware.73736783.susgen
MAXmalware (ai score=87)
MicrosoftTrojan:Win32/Wacatac.DD!ml
ArcabitTrojan.Graftor.DD0E97
AhnLab-V3Malware/Win32.Generic.C4224420
GDataGen:Variant.Graftor.855703
CynetMalicious (score: 100)
ESET-NOD32a variant of Win32/Injector.ENVQ
ALYacGen:Variant.Graftor.855703
VBA32Malware-Cryptor.Inject.gen
MalwarebytesTrojan.MalPack.DLF
RisingTrojan.Injector!1.CB27 (CLASSIC)
IkarusTrojan.Inject
eGambitUnsafe.AI_Score_99%
FortinetW32/Injector.ENVN!tr
AVGWin32:Trojan-gen
CrowdStrikewin/malicious_confidence_80% (D)

How to remove Graftor.855703?

Graftor.855703 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment