Malware

Kryptik.230 malicious file

Malware Removal

The Kryptik.230 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Kryptik.230 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Uses suspicious command line tools or Windows utilities
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Kryptik.230?


File Info:

name: AA80C66BD9E012BC601D.mlw
path: /opt/CAPEv2/storage/binaries/62b7d53e441f877aad9b3d9d481d532292bd48f777aa60ab2d9d902a57dae4be
crc32: 8BC6708D
md5: aa80c66bd9e012bc601d4d32d9d4fad6
sha1: a43319ea864bde519b2044a0c3d48e8a5a5a970d
sha256: 62b7d53e441f877aad9b3d9d481d532292bd48f777aa60ab2d9d902a57dae4be
sha512: d30994c05b3ab075927c69061210d1d00d888eb40264503920cf6f8dd3f09cc079bdc9672f737bfc77a250fe269787a65fc6f6c823dee028827b375ee9fa81f8
ssdeep: 98304:w+TOzsRl/L/OYtDujdgkV4LDqI4D+5lYNQpHZ8LjcYz0ICuB3ShUzT2jw2jXcv:5csLOYtlkVuD94SONiZ8fcM5p9SDjw6E
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1CD36330B3AF28534E546CC350CDF7CA4CEBB2F5B9D7AF005A3AD497D7A1A2924801D92
sha3_384: 4d1e99c3e7c31c8b1b101d4bf94c9a411084e4f5974465629919a524b8e6144c95f1eccb91c577c61663b2ec7f4afda9
ep_bytes: 558bec83c4d453565733c08945f08945
timestamp: 1992-06-19 22:22:17

Version Info:

Comments: This installation was built with Inno Setup: http://www.innosetup.com
CompanyName:
FileDescription: File Backup Watcher 2.8.4.19 Setup
FileVersion: 2.8.4.16
InternalName:
OriginalFilename:
ProductName:
ProductVersion:
Translation: 0x0409 0x04e4

Kryptik.230 also known as:

LionicTrojan.Win32.Ekstak.4!c
DrWebTrojan.Zadved.1786
MicroWorld-eScanGen:Variant.Kryptik.230
FireEyeGen:Variant.Kryptik.230
McAfeeArtemis!AA80C66BD9E0
MalwarebytesMalware.AI.840505854
SangforDropper.Win32.Ekstak.Vw7t
K7AntiVirusTrojan ( 005722fe1 )
AlibabaTrojanDropper:Win32/Ekstak.2309f753
K7GWTrojan ( 005722fe1 )
CrowdStrikewin/malicious_confidence_100% (W)
CyrenW32/ABRisk.XFJU-3740
SymantecTrojan.Gen.MBT
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/TrojanDropper.Agent.SLC
CynetMalicious (score: 99)
KasperskyTrojan.Win32.Ekstak.anskz
BitDefenderGen:Variant.Kryptik.230
AvastWin32:Malware-gen
TencentWin32.Trojan.Ekstak.Ogil
EmsisoftGen:Variant.Kryptik.230 (B)
F-SecureTrojan.TR/AD.Nekark.spuza
VIPREGen:Variant.Kryptik.230
McAfee-GW-EditionBehavesLike.Win32.ObfuscatedPoly.rc
Trapminesuspicious.low.ml.score
SophosMal/Generic-S
GDataGen:Variant.Kryptik.230
JiangminTrojan.Ekstak.chpv
WebrootW32.Ekstak
AviraTR/AD.Nekark.spuza
ArcabitTrojan.Kryptik.230
ZoneAlarmTrojan.Win32.Ekstak.anskz
MicrosoftTrojan:Win32/Woreflint.A!cl
AhnLab-V3Trojan/Win.Malware-gen.R569293
ALYacGen:Variant.Kryptik.230
MAXmalware (ai score=83)
Cylanceunsafe
PandaTrj/Chgt.AD
TrendMicro-HouseCallTROJ_GEN.R002H0DDJ23
IkarusTrojan-Dropper.Win32.Agent
MaxSecureTrojan.Malware.206648200.susgen
FortinetW32/Agent.SLC!tr
AVGWin32:Malware-gen
DeepInstinctMALICIOUS

How to remove Kryptik.230?

Kryptik.230 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment