Malware

Malware.AI.3977513071 (file analysis)

Malware Removal

The Malware.AI.3977513071 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Malware.AI.3977513071 virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Creates RWX memory
  • Mimics the system’s user agent string for its own requests
  • Reads data out of its own binary image
  • The binary likely contains encrypted or compressed data.
  • Executed a process and injected code into it, probably while unpacking
  • Behavior consistent with a dropper attempting to download the next stage.
  • Exhibits behavior characteristic of Locky ransomware

Related domains:

einkhihmf.su
dkoauvc.org
ligxpxrjqrc.org
lfegyrhlqan.info
utpqvymoudydfsbs.work
ekxerkvvlmafvn.info
vquxtkranwwvbril.su
ynmkpuvjrfohdw.work
swdmqjtbvwgoqaf.pw

How to determine Malware.AI.3977513071?


File Info:

crc32: B50E725D
md5: 7b11aa90deb174a3ad88452599cbfa31
name: 7B11AA90DEB174A3AD88452599CBFA31.mlw
sha1: 1e789a7f8d81bc0946e15a0bb2319f2c37c82af2
sha256: 9ee2e58bbaf9d08bb0bb89b94636763432f47da881d12036e1acbb0b112a6019
sha512: 0a86d675cfb27c520b4302b24b9020e8418b723e63629fb6132ce535266565a875f3c3eb6d7e76184fc4e06dedcdbe3e5b2ea83e70f93313c6c40c8571c928c0
ssdeep: 6144:viOdsHFWE5Xs8SXXncX1Q8EdpTu3dDPeSruOk9FS9:v9sH885SXXMWrSCTY9
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Malware.AI.3977513071 also known as:

BkavW32.AIDetect.malware1
K7AntiVirusTrojan ( 004f30831 )
Elasticmalicious (high confidence)
DrWebBackDoor.Bebloh.199
CynetMalicious (score: 100)
ALYacTrojan.Ransom.LockyCrypt
CylanceUnsafe
ZillyaTrojan.Kryptik.Win32.908720
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (D)
AlibabaRansom:Win32/Locky.e4238ac0
K7GWTrojan ( 004f30831 )
Cybereasonmalicious.0deb17
CyrenW32/Trojan.HDZZ-3791
SymantecRansom.Locky!g9
ESET-NOD32Win32/Filecoder.Locky.C
ZonerTrojan.Win32.43250
APEXMalicious
AvastWin32:Malware-gen
KasperskyTrojan-Ransom.Win32.Locky.akz
BitDefenderTrojan.GenericKD.3355546
NANO-AntivirusTrojan.Win32.Bebloh.eeatof
ViRobotTrojan.Win32.Locky.259072
SUPERAntiSpywareRansom.Locky/Variant
MicroWorld-eScanTrojan.GenericKD.3355546
TencentMalware.Win32.Gencirc.10bdd88a
Ad-AwareTrojan.GenericKD.3355546
SophosML/PE-A + Mal/Isda-D
BitDefenderThetaGen:NN.ZexaF.34690.puX@aWb!OEmi
VIPRETrojan.Win32.Generic!BT
TrendMicroRansom_LOCKY.SMR5
McAfee-GW-EditionBehavesLike.Win32.DocumentCrypt.dc
FireEyeGeneric.mg.7b11aa90deb174a3
EmsisoftTrojan.GenericKD.3355546 (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Locky.aom
WebrootW32.Trojan.Gen
AviraTR/AD.Locky.Y.tqeu
MicrosoftVirTool:Win32/Injector.IM
ArcabitTrojan.Generic.D33339A
AegisLabTrojan.Win32.Locky.tnpr
GDataTrojan.GenericKD.3355546
AhnLab-V3Trojan/Win32.Locky.C1491895
Acronissuspicious
McAfeeRansomware-FOV!7B11AA90DEB1
MAXmalware (ai score=88)
VBA32TrojanRansom.Locky
MalwarebytesMalware.AI.3977513071
PandaTrj/CI.A
TrendMicro-HouseCallRansom_LOCKY.SMR5
RisingTrojan.Ransom-Locky!8.4655 (CLOUD)
YandexTrojan.Locky!hLO5p000Nuc
IkarusTrojan-Ransom.GandCrab
FortinetW32/Bebloh.P!tr
AVGWin32:Malware-gen
Paloaltogeneric.ml

How to remove Malware.AI.3977513071?

Malware.AI.3977513071 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment