Ransom

Ransom.106 (B) (file analysis)

Malware Removal

The Ransom.106 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Ransom.106 (B) virus can do?

  • Executable code extraction
  • Injection with CreateRemoteThread in a remote process
  • Attempts to connect to a dead IP:Port (2 unique times)
  • Creates RWX memory
  • Reads data out of its own binary image
  • A process created a hidden window
  • Drops a binary and executes it
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Queries information on disks for anti-virtualization via Device Information APIs
  • Deletes its original binary from disk
  • Sniffs keystrokes
  • A system process is generating network traffic likely as a result of process injection
  • Installs itself for autorun at Windows startup
  • Creates a copy of itself
  • Creates a slightly modified copy of itself
  • Anomalous binary characteristics

Related domains:

maytermsmodiall.at
resolver1.opendns.com
myip.opendns.com
geroyamslava.at

How to determine Ransom.106 (B)?


File Info:

crc32: CA66A720
md5: b2ad121e084c6a40b2415f56293994af
name: B2AD121E084C6A40B2415F56293994AF.mlw
sha1: 602e2710d1169fe2cadd87009ae1e8859e5fd747
sha256: 3076755c82d1ae689db32bf58197003d9f5da3db9abc5bedbea24d3e56392586
sha512: e5e505d68e05d4707884c03f096adb7da0f09e8c98ea6f305dcfe052206492f55673db5d223732d1e655998c986c06d38ba6fd17eb1b316d9dfd0af22e0e967f
ssdeep: 6144:zNozvlzavzavzVzamFMn3WGsy+GsrrivYM0OU141k/YHckCdsc4C49sbQRSGM:zNozvTW3WGpbvYh141CbTao3
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Ransom.106 (B) also known as:

BkavW32.AIDetect.malware1
K7AntiVirusTrojan ( 0052ef101 )
Elasticmalicious (high confidence)
DrWebTrojan.Encoder.10103
CynetMalicious (score: 100)
CAT-QuickHealRansom.Exxroute.A3
ALYacGen:Variant.Ransom.106
CylanceUnsafe
SangforTrojan.Win32.Save.a
AlibabaTrojanSpy:Win32/Ursnif.92c9b6ab
K7GWTrojan ( 0052ef101 )
CyrenW32/Spora.B.gen!Eldorado
SymantecPacked.Generic.493
ESET-NOD32a variant of Win32/Kryptik.FOSU
APEXMalicious
AvastWin32:Malware-gen
ClamAVWin.Ransomware.Spora-9808410-0
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.Ransom.106
NANO-AntivirusTrojan.Win32.Spora.elwdgw
MicroWorld-eScanGen:Variant.Ransom.106
TencentMalware.Win32.Gencirc.114b085a
Ad-AwareGen:Variant.Ransom.106
SophosML/PE-A + Mal/Elenoocka-E
ComodoTrojWare.Win32.Crypt.CA@6ykcle
BitDefenderThetaGen:NN.ZexaF.34686.vqW@amNxRTm
VIPRETrojan.Win32.Generic!BT
TrendMicroRansom_HPCERBER.SMONT4
McAfee-GW-EditionBehavesLike.Win32.Ransomware.fc
FireEyeGeneric.mg.b2ad121e084c6a40
EmsisoftGen:Variant.Ransom.106 (B)
SentinelOneStatic AI – Malicious PE
AviraTR/Crypt.XPACK.Gen8
MicrosoftTrojanSpy:Win32/Ursnif.HX
ArcabitTrojan.Ransom.106
AegisLabTrojan.Win32.Generic.4!c
GDataGen:Variant.Ransom.106
AhnLab-V3Trojan/Win32.Cerber.R198878
Acronissuspicious
McAfeeRansomware-FMJ!B2AD121E084C
MAXmalware (ai score=99)
VBA32BScope.Trojan.Zbot.2312
MalwarebytesRansom.Cerber
PandaTrj/Genetic.gen
TrendMicro-HouseCallRansom_HPCERBER.SMONT4
RisingRansom.Cerber!8.3058 (CLOUD)
YandexTrojan.GenAsa!g4m8kxlnc38
IkarusTrojan.Ransom.Spora
FortinetW32/Kryptik.FONH!tr
AVGWin32:Malware-gen
Paloaltogeneric.ml

How to remove Ransom.106 (B)?

Ransom.106 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment