Categories: Malware

About “Jaiko.2739 (B)” infection

The Jaiko.2739 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Jaiko.2739 (B) virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Mimics the system’s user agent string for its own requests
  • Reads data out of its own binary image
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • Behavior consistent with a dropper attempting to download the next stage.
  • Exhibits behavior characteristic of Locky ransomware
  • Exhibits possible ransomware file modification behavior
  • Attempts to modify proxy settings
  • Appends a known Locky ransomware file extension to files that have been encrypted
  • Creates a known Locky ransomware decryption instruction / key file.

Related domains:

igrovie-awtomaty-play.ru

How to determine Jaiko.2739 (B)?


File Info:

crc32: 9EFF8816md5: 7ee4deaba2d56979268d696bcafe152bname: 7EE4DEABA2D56979268D696BCAFE152B.mlwsha1: 3312f19463310acaf625d44c9446278871e886fcsha256: 49949501854b84f5214d4f364001aed96e77edd31e514c5a01dcf17b039ea11asha512: da8dadaa92b7a16dbf645ca7a24c49e8081808bc5a807b1956edf03004130428d32335dc194cecbd7387cc93540576b55aab9a0f3b5c9f87c814b160e14d4f0bssdeep: 3072:kNuO421vKt+LRtw/H2eK4w9SC3XBq40Rxqg9bvx8ZOlBLKrtOeV:kK2tKILRtw/w9SCnBqjxqMbpYOj+Ietype: MS-DOS executable, MZ for MS-DOS

Version Info:

LegalCopyright: Elaborate Bytes Copyright xa9.Assembly Version: 8.6.80.6InternalName: WellPotterFileVersion: 8.6.80.6CompanyName: Elaborate BytesPrivateBuild: 8.6.80.6LegalTrademarks: Elaborate Bytes Copyright xa9.Comments: Thinkers Move Vote VisionProductName: WellPotterLanguages: EnglishProductVersion: 8.6.80.6FileDescription: Thinkers Move Vote VisionOriginalFilename: WellPotterTranslation: 0x0409 0x04b0

Jaiko.2739 (B) also known as:

Bkav W32.AIDetect.malware1
K7AntiVirus Trojan ( 004f00a01 )
DrWeb Trojan.Encoder.3976
Cynet Malicious (score: 100)
ALYac Gen:Variant.Jaiko.2739
Cylance Unsafe
Zillya Trojan.Locky.Win32.3360
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_70% (D)
K7GW Trojan ( 004f00a01 )
Cybereason malicious.ba2d56
Symantec ML.Attribute.HighConfidence
ESET-NOD32 Win32/Filecoder.Locky.C
APEX Malicious
Avast Win32:Malware-gen
Kaspersky Trojan-Ransom.Win32.Locky.xak
BitDefender Gen:Variant.Jaiko.2739
NANO-Antivirus Trojan.Win32.Locky.ekusix
MicroWorld-eScan Gen:Variant.Jaiko.2739
Tencent Win32.Trojan.Filecoder.Ange
Ad-Aware Gen:Variant.Jaiko.2739
Sophos Mal/Generic-S
Comodo Malware@#138cqrv3kkuuc
BitDefenderTheta Gen:NN.ZexaF.34692.pmuaamUnDAei
VIPRE Trojan.Win32.Generic!BT
TrendMicro Ransom_LOCKY.F117AN
McAfee-GW-Edition BehavesLike.Win32.Injector.dc
FireEye Generic.mg.7ee4deaba2d56979
Emsisoft Gen:Variant.Jaiko.2739 (B)
SentinelOne Static AI – Malicious PE
Jiangmin TrojanDownloader.Trik.ah
Avira TR/AD.Locky.opacx
eGambit Unsafe.AI_Score_80%
Antiy-AVL Trojan/Generic.ASMalwS.1DC9EC5
Microsoft Ransom:Win32/FileCryptor
Arcabit Trojan.Jaiko.DAB3
AegisLab Trojan.Win32.Locky.j!c
ZoneAlarm Trojan-Ransom.Win32.Locky.xak
GData Gen:Variant.Jaiko.2739
TACHYON Ransom/W32.Locky.246784.C
McAfee Generic.awl
MAX malware (ai score=100)
VBA32 Hoax.Locky
Panda Trj/CI.A
TrendMicro-HouseCall Ransom_LOCKY.F117AN
Rising Ransom.Genasom!8.293 (CLOUD)
Yandex Trojan.Locky!IXULvMKuSC4
Ikarus Trojan.Win32.Filecoder
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/Filecoder_Locky.C!tr
AVG Win32:Malware-gen
Paloalto generic.ml

How to remove Jaiko.2739 (B)?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

MSIL/GenKryptik.GXIZ information

The MSIL/GenKryptik.GXIZ is considered dangerous by lots of security experts. When this infection is active,…

2 months ago

Malware.AI.2789448175 (file analysis)

The Malware.AI.2789448175 is considered dangerous by lots of security experts. When this infection is active,…

2 months ago

Jalapeno.1878 removal instruction

The Jalapeno.1878 is considered dangerous by lots of security experts. When this infection is active,…

2 months ago

What is “Trojan.Heur3.LPT.YmKfaKBcBekib”?

The Trojan.Heur3.LPT.YmKfaKBcBekib is considered dangerous by lots of security experts. When this infection is active,…

2 months ago

How to remove “Worm.Win32.Vobfus.exmt”?

The Worm.Win32.Vobfus.exmt is considered dangerous by lots of security experts. When this infection is active,…

2 months ago

About “TrojanDownloader:Win32/Beebone.JO” infection

The TrojanDownloader:Win32/Beebone.JO is considered dangerous by lots of security experts. When this infection is active,…

2 months ago