Malware

Heur.PonyStealer.cmKfoW1WLRmi removal instruction

Malware Removal

The Heur.PonyStealer.cmKfoW1WLRmi is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Heur.PonyStealer.cmKfoW1WLRmi virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Behavioural detection: Injection (Process Hollowing)
  • Behavioural detection: Injection (inter-process)

How to determine Heur.PonyStealer.cmKfoW1WLRmi?


File Info:

name: 3BB8E436EE4D7BFFFF47.mlw
path: /opt/CAPEv2/storage/binaries/06d1d5c6451d7b4de99856e10d2cb1e2730aa44368322a496351f30870ae8889
crc32: 9E708762
md5: 3bb8e436ee4d7bffff478f6e9a02b73b
sha1: 39fb6ce7f3f95e4bdfff0e96c034fc0ac2a2d804
sha256: 06d1d5c6451d7b4de99856e10d2cb1e2730aa44368322a496351f30870ae8889
sha512: 3e3da10f02df2c1a4e6667e95d11d7594be51c09c5aa38b285a15b3c13ffc4044d1235c94e8504aafff3e7d46cb052896e4af61e6e971d8f6c7985e5c4ff064c
ssdeep: 768:Ou3IuqvhIlJroxog1wFYBBvbFVZmZsQ16EAb:H3I5vi3o3t3mZsO6Hb
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T16713D0BDB304A5D1E13B21B143B6ABD352278D66E952422CB515E61F3D74E31EF28206
sha3_384: 2cd70017badb4d6a788a29fd04872e568fe5dab43c8accb4801548620c9e377faa51a9452ac742b29747a15e80c71061
ep_bytes: 60be00d040008dbe0040ffff57eb0b90
timestamp: 2009-03-11 18:01:31

Version Info:

Translation: 0x0409 0x04b0
CompanyName: Chamele9
LegalCopyright: Lukkelove
LegalTrademarks: Agartan9
ProductName: trapezo
FileVersion: 1.00
ProductVersion: 1.00
InternalName: SORTEB
OriginalFilename: SORTEB.exe

Heur.PonyStealer.cmKfoW1WLRmi also known as:

Elasticmalicious (moderate confidence)
MicroWorld-eScanGen:Heur.PonyStealer.cmKfoW1WLRmi
McAfeeArtemis!3BB8E436EE4D
CylanceUnsafe
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_70% (W)
CyrenW32/Injector.XV.gen!Eldorado
SymantecPacked.Generic.603
tehtrisGeneric.Malware
ESET-NOD32a variant of Win32/Injector.EKCC
APEXMalicious
CynetMalicious (score: 100)
KasperskyTrojan.Win32.Vebzenpak.aiao
BitDefenderGen:Heur.PonyStealer.cmKfoW1WLRmi
NANO-AntivirusTrojan.Win32.KillProc2.gwiwhq
AvastWin32:Trojan-gen
Ad-AwareGen:Heur.PonyStealer.cmKfoW1WLRmi
SophosML/PE-A + Mal/FareitVB-X
DrWebTrojan.KillProc2.8428
VIPREGen:Heur.PonyStealer.cmKfoW1WLRmi
McAfee-GW-EditionBehavesLike.Win32.Trojan.pc
Trapminemalicious.high.ml.score
FireEyeGeneric.mg.3bb8e436ee4d7bff
EmsisoftGen:Heur.PonyStealer.cmKfoW1WLRmi (B)
SentinelOneStatic AI – Malicious PE
GDataGen:Heur.PonyStealer.cmKfoW1WLRmi
JiangminBackdoor.MSIL.cnou
AviraHEUR/AGEN.1210947
MicrosoftTrojan:Win32/Wacatac.B!ml
GoogleDetected
VBA32BScope.Trojan.Detplock
ALYacGen:Heur.PonyStealer.cmKfoW1WLRmi
MAXmalware (ai score=83)
MalwarebytesMalware.Heuristic.1003
IkarusTrojan.VB.Crypt
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Injector.EKKW!tr
BitDefenderThetaGen:NN.ZevbaF.34682.cmKfaW1WLRmi
AVGWin32:Trojan-gen
Cybereasonmalicious.6ee4d7
PandaTrj/GdSda.A

How to remove Heur.PonyStealer.cmKfoW1WLRmi?

Heur.PonyStealer.cmKfoW1WLRmi removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment