Ransom

Ransom.Petya.3 information

Malware Removal

The Ransom.Petya.3 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Ransom.Petya.3 virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Drops a binary and executes it
  • The binary likely contains encrypted or compressed data.
  • Likely installs a bootkit via raw harddisk modifications
  • Attempts to restart the guest VM
  • Mimics the file times of a Windows system file
  • Creates a copy of itself
  • Creates a slightly modified copy of itself
  • Anomalous binary characteristics

How to determine Ransom.Petya.3?


File Info:

crc32: D4AFEA4B
md5: 71be82ca0cd2a6592d4462e3c2167d0e
name: 71BE82CA0CD2A6592D4462E3C2167D0E.mlw
sha1: d8f3efa839118f488f262d63cef8a95abb3c69e3
sha256: 267e2ed4164d658954144a7f6dd5b0ef2fa1fe4bd015f85bf967f3c5072cbc6e
sha512: 277a2c6c6ea5b63eae6bbca6c076712296a3af19e348819299faafed44f699ea1c1788c09ae46c0c762529225b665cd1e78c242225438d133ba163b0107f3a02
ssdeep: 3072:wPfQjrk0CbHwg9YUrxtMwbazLuP5Tozdai9HjEiJy4Jfdb5Ty+nOJnJFCVw+PpF:yInk0iwgp8JLJR1EQHmFCVVD
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: xa9 Microsoft Corporation. All rights reserved.
InternalName: raserver.exe
FileVersion: 6.1.7600.16385 (win7_rtm.090713-1255)
CompanyName: Microsoft Corporation
ProductName: Microsoftxae Windowsxae Operating System
ProductVersion: 6.1.7600.16385
FileDescription: Windows Remote Assistance COM Server
OriginalFilename: raserver.exe
Translation: 0x0409 0x04b0

Ransom.Petya.3 also known as:

BkavW32.AIDetect.malware2
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Ransom.Petya.3
FireEyeGeneric.mg.71be82ca0cd2a659
McAfeeRDN/Ransom
CylanceUnsafe
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (D)
BitDefenderGen:Variant.Ransom.Petya.3
K7GWTrojan ( 004ffb661 )
K7AntiVirusTrojan ( 004ffb661 )
CyrenW32/Agent.AQL.gen!Eldorado
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastWin32:Malware-gen
ClamAVWin.Ransomware.Goldeneye-7088621-0
KasperskyHEUR:Trojan.Win32.Generic
AlibabaHackTool:Win32/PowerSploit.62cb245a
RisingRansom.Petya!8.48D7 (CLOUD)
Ad-AwareGen:Variant.Ransom.Petya.3
EmsisoftGen:Variant.Ransom.Petya.3 (B)
ComodoMalware@#32relhj0nodj7
F-SecureHeuristic.HEUR/AGEN.1120121
VIPRETrojan.Win32.Generic!BT
TrendMicroRansom_PETYA.SM1
McAfee-GW-EditionBehavesLike.Win32.Virut.fm
SophosMal/Generic-R + Troj/Petya-BM
IkarusTrojan.Win32.Diskcoder
JiangminTrojan.Petr.f
AviraHEUR/AGEN.1120121
KingsoftWin32.Troj.Undef.(kcloud)
MicrosoftHackTool:Win32/PowerSploit.A
ArcabitTrojan.Ransom.Petya.3
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataGen:Variant.Ransom.Petya.3
CynetMalicious (score: 85)
AhnLab-V3Trojan/Win32.Petr.C1713110
Acronissuspicious
BitDefenderThetaGen:NN.ZexaF.34608.wq0@aG86Ntki
MAXmalware (ai score=81)
VBA32BScope.Trojan.MTA
MalwarebytesRansom.Petya
PandaTrj/Genetic.gen
ESET-NOD32Win32/Diskcoder.Petya.D
TrendMicro-HouseCallRansom_PETYA.SM1
TencentMalware.Win32.Gencirc.10bc4a67
YandexTrojan.Agent!jp0xA/ioTfU
SentinelOneStatic AI – Suspicious PE
FortinetW32/Generic.AC.3B167F!tr
WebrootW32.Gen.BT
AVGWin32:Malware-gen
Paloaltogeneric.ml
Qihoo-360Win32/Trojan.Generic.HwoCar8A

How to remove Ransom.Petya.3?

Ransom.Petya.3 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment