Malware

Jatif.1254 removal tips

Malware Removal

The Jatif.1254 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Jatif.1254 virus can do?

  • Executable code extraction
  • Injection with CreateRemoteThread in a remote process
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • Reads data out of its own binary image
  • A process created a hidden window
  • Drops a binary and executes it
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Queries information on disks for anti-virtualization via Device Information APIs
  • Sniffs keystrokes
  • Installs itself for autorun at Windows startup
  • Creates a copy of itself
  • Creates a slightly modified copy of itself

Related domains:

z.whorecord.xyz
a.tomx.xyz
monsteradds.at
resolver1.opendns.com
myip.opendns.com
fileservers.at

How to determine Jatif.1254?


File Info:

crc32: 9B889C47
md5: 1ff12aab13045315d34d8d1cb835b262
name: 1FF12AAB13045315D34D8D1CB835B262.mlw
sha1: 5fb4c7b270e9ef6ce701963a676a5e36cecc2bcf
sha256: cc8b0fbfce10364d69a8ac6cec01d52bfcf4b45803349bf510d5bf2db63a1ece
sha512: c441dabd6b6e36998489c1b88bbb5f0f4b42c4d27154e562e44508dd756d1d7abfe73e4ddbd425ad76e9a9e190cee6bc14be9a9eec268aceb74520b7df4a5126
ssdeep: 12288:93wEkWbk7iA+TQqZnXoS0a2TsWLvj9VR3paeq:no7ij0EXP2AOvj+v
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright 2015 SyncDriver
CompanyName: SyncDriver
FileDescription: Raises Upgradewhen Digest Southern
ProductName: Lotus
ProductVersion: 9.6.5.8
PrivateBuild: 9.6.5.8
Translation: 0x0409 0x04b0

Jatif.1254 also known as:

K7AntiVirusSpyware ( 00505c591 )
LionicTrojan.Win32.Foreign.j!c
Elasticmalicious (high confidence)
DrWebBackDoor.Gozi.85
CynetMalicious (score: 100)
CAT-QuickHealTrojan.MauvaiseRI.S5247343
ALYacGen:Variant.Jatif.1254
CylanceUnsafe
ZillyaTrojan.Foreign.Win32.55921
SangforRansom.Win32.Foreign.nlqr
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaRansom:Win32/Foreign.89f91394
K7GWSpyware ( 00505c591 )
Cybereasonmalicious.b13045
SymantecTrojan Horse
ESET-NOD32Win32/Spy.Ursnif.AO
APEXMalicious
AvastWin32:DangerousSig [Trj]
KasperskyTrojan-Ransom.Win32.Foreign.nlqr
BitDefenderGen:Variant.Jatif.1254
NANO-AntivirusTrojan.Win32.AD.enazcp
MicroWorld-eScanGen:Variant.Jatif.1254
TencentMalware.Win32.Gencirc.114aac1a
Ad-AwareGen:Variant.Jatif.1254
SophosMal/Generic-S
ComodoMalware@#5nzjtskzzm42
VIPRETrojan.Win32.Generic!BT
TrendMicroRansom_Foreign.R002C0ODP21
McAfee-GW-EditionArtemis!Trojan
FireEyeGeneric.mg.1ff12aab13045315
EmsisoftGen:Variant.Jatif.1254 (B)
SentinelOneStatic AI – Suspicious PE
JiangminTrojan.Foreign.cim
WebrootW32.Trojan.Gen
AviraTR/AD.UrsnifDropper.ledfe
Antiy-AVLTrojan/Generic.ASMalwS.1F5B99D
KingsoftWin32.Troj.Undef.(kcloud)
MicrosoftTrojan:Win32/Glupteba!ml
ArcabitTrojan.Jatif.D4E6
GDataGen:Variant.Jatif.1254
AhnLab-V3Trojan/Win32.Foreign.C1958986
McAfeeArtemis!1FF12AAB1304
MAXmalware (ai score=100)
VBA32Hoax.Foreign
PandaTrj/Agent.AAJ
TrendMicro-HouseCallRansom_Foreign.R002C0ODP21
RisingTrojan.Generic@ML.86 (RDML:t+YHps05tLXp5JHiwd+OLg)
YandexTrojan.Foreign!73UnL6x7bsc
IkarusTrojan-Ransom.GandCrab
FortinetW32/Kryptik.FQUM!tr
AVGWin32:DangerousSig [Trj]
Paloaltogeneric.ml
Qihoo-360Win32/Trojan.Foreign.HgIASQwA

How to remove Jatif.1254?

Jatif.1254 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment