The Ransom.Crypt0L0cker.36 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.
Gridinsoft Anti-Malware
Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
What Ransom.Crypt0L0cker.36 virus can do?
- Executable code extraction
- Attempts to connect to a dead IP:Port (1 unique times)
- Enumerates user accounts on the system
- Creates RWX memory
- A process attempted to delay the analysis task.
- A process created a hidden window
- Drops a binary and executes it
- HTTP traffic contains suspicious features which may be indicative of malware related traffic
- Creates an excessive number of UDP connection attempts to external IP addresses
- Performs some HTTP requests
- Unconventionial language used in binary resources: Portuguese
- The binary likely contains encrypted or compressed data.
- The executable is compressed using UPX
- Looks up the external IP address
- Uses Windows utilities for basic functionality
- Attempts to delete volume shadow copies
- Attempts to repeatedly call a single API many times in order to delay analysis time
- Modifies boot configuration settings
- Exhibits behavior characteristic of Cerber ransomware
- Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
- Mimics the file times of a Windows system file
- Installs itself for autorun at Windows startup
- Creates a hidden or system file
- EternalBlue behavior
- Creates a copy of itself
- Generates some ICMP traffic
- Uses suspicious command line tools or Windows utilities
Related domains:
ipinfo.io |
How to determine Ransom.Crypt0L0cker.36?
File Info:
crc32: 57D35AA3md5: e7083c5543c9dd54ca7d6b572c170ac8name: E7083C5543C9DD54CA7D6B572C170AC8.mlwsha1: a75003ab320e869d9ae645c2bcbfdf48f8ad7ccesha256: c89a5020171ea4e6998f548c351215d4adb29e86c86f768046984782be7f4fa7sha512: a38965bb82409a63e13052c66c73bb5150132c42f40be6d10012febd4ce1b250a0c81c3cbe140982d02378dd1c3a0762dd63f9936788834cd160024a0ec29289ssdeep: 3072:r6dllP6CUZBMDrDiJTC7NQUAY1AJC6m7+EpFp7rkyiEvHptwmQj6:rugFKUANQUmC6wV7wxKI6type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressedVersion Info:
eUp Software: Vx17x01FileDescriptionComments: @x10x01CompanyNameeUp Utilities 2014: @x0ex01ProductVersioneUp Registry Defrag: <x0ex01FileVersionyright xa9 AVG Netherlands B. V. 2011: Lx12x01LegalTrademarkseUp Utilitiesx2122: Lx16x01ProductName0.1000.340: DTranslation: 0x0407 0x04b0
Ransom.Crypt0L0cker.36 also known as:
Bkav | W32.AIDetect.malware2 |
K7AntiVirus | Trojan ( 005224381 ) |
Elastic | malicious (high confidence) |
DrWeb | Trojan.Encoder.4691 |
Cynet | Malicious (score: 100) |
CAT-QuickHeal | TrojanRansom.Crowti.MUE.A4 |
ALYac | Gen:Variant.Ransom.Crypt0L0cker.36 |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
Alibaba | Ransom:Win32/Cerber.813cd1fa |
K7GW | Trojan ( 005224381 ) |
Cybereason | malicious.543c9d |
Baidu | Win32.Trojan.Kryptik.alh |
Symantec | Ransom.Cerber |
ESET-NOD32 | a variant of Win32/Kryptik.EZKW |
APEX | Malicious |
Avast | Win32:Trojan-gen |
ClamAV | Win.Ransomware.Cerber-7082581-1 |
Kaspersky | HEUR:Trojan.Win32.Generic |
BitDefender | Gen:Variant.Ransom.Crypt0L0cker.36 |
NANO-Antivirus | Trojan.Win32.Mentiger.fncikg |
MicroWorld-eScan | Gen:Variant.Ransom.Crypt0L0cker.36 |
Tencent | Win32.Trojan.Generic.Ahxw |
Ad-Aware | Gen:Variant.Ransom.Crypt0L0cker.36 |
Sophos | Mal/EncPk-ZC |
Comodo | TrojWare.Win32.Kryptik.FBWM@6gt9t1 |
BitDefenderTheta | Gen:NN.ZexaF.34142.lmKfaS7RNY0S |
McAfee-GW-Edition | BehavesLike.Win32.Dropper.cc |
FireEye | Generic.mg.e7083c5543c9dd54 |
Emsisoft | Gen:Variant.Ransom.Crypt0L0cker.36 (B) |
SentinelOne | Static AI – Malicious PE |
Jiangmin | Trojan.Generic.bsfas |
Avira | TR/Crypt.XPACK.Gen |
Antiy-AVL | Trojan/Generic.ASMalwS.22D461B |
Microsoft | Ransom:Win32/Cerber.A |
GData | Gen:Variant.Ransom.Crypt0L0cker.36 |
McAfee | Artemis!E7083C5543C9 |
MAX | malware (ai score=83) |
VBA32 | Trojan.MTA.0947 |
Panda | Trj/GdSda.A |
Rising | Trojan.Kryptik!1.AE9C (CLASSIC) |
Yandex | Trojan.Kryptik!fJB90X1N8l0 |
Ikarus | Trojan-Ransom.Teerac |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | W32/Kryptik.HGZD!tr |
AVG | Win32:Trojan-gen |
Paloalto | generic.ml |
How to remove Ransom.Crypt0L0cker.36?
- Download and install GridinSoft Anti-Malware.
- Open GridinSoft Anti-Malware and perform a “Standard scan“.
- “Move to quarantine” all items.
- Open “Tools” tab – Press “Reset Browser Settings“.
- Select proper browser and options – Click “Reset”.
- Restart your computer.
Leave a Comment