Ransom

Ransom.Pipaki.6 removal

Malware Removal

The Ransom.Pipaki.6 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Ransom.Pipaki.6 virus can do?

  • Executed a command line with /C or /R argument to terminate command shell on completion which can be used to hide execution
  • Checks adapter addresses which can be used to detect virtual network interfaces
  • Dynamic (imported) function loading detected
  • Performs HTTP requests potentially not found in PCAP.
  • Enumerates running processes
  • Expresses interest in specific running processes
  • Manipulates data from or to the Recycle Bin
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • A scripting utility was executed
  • Uses Windows utilities for basic functionality
  • Attempts to modify proxy settings
  • Creates a copy of itself

How to determine Ransom.Pipaki.6?


File Info:

name: 0B1B688881B4D690AD15.mlw
path: /opt/CAPEv2/storage/binaries/0737ddbd894f37316eee04c6739ac32f0c888535783a1af8c873023bcebbb8e8
crc32: 3032F4E7
md5: 0b1b688881b4d690ad1574a0a34ced6e
sha1: 49e69c5cf546d9312b768a15fa7c1dac432e2d75
sha256: 0737ddbd894f37316eee04c6739ac32f0c888535783a1af8c873023bcebbb8e8
sha512: 40b5bc54a0d51e65bc5956ca5172c26519bcbd406d42aa9f16a2cf0913c9315c90f873d1afc60fc20bd6be89170644b0f2fa42468bd0936bb80d41e1080b8006
ssdeep: 3072:t3blGV9hulKmhbfvjv69vF6nHynNPFW7Lifa81HhJmrGSFtNi48xDkGCW/E2L:t3bq9UlKgPuEyNFWSb1Hfmqi/8xDx/ZL
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T17E146B66F6818D32F1555F3CCE5BD2A9B17A78302E1C5046BDE94D8E9A3F6D2242C2C3
sha3_384: 0f30e38d889eb4b9a1318a386b9904f97e034aa44a5125dfa6dcfd08ed238c54ad7356942de2beca51b779e182bd4394
ep_bytes: 558becb9210000006a006a004975f953
timestamp: 2022-07-20 09:47:14

Version Info:

0: [No Data]

Ransom.Pipaki.6 also known as:

BkavW32.AIDetect.malware1
CynetMalicious (score: 100)
McAfeeRansom-Monster!0B1B688881B4
Cybereasonmalicious.881b4d
VirITRansom.Win32.Phobos.DGY
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Filecoder.Buran.K
APEXMalicious
KasperskyHEUR:Trojan-Ransom.Win32.Agent.gen
BitDefenderGen:Variant.Ransom.Pipaki.6
MicroWorld-eScanGen:Variant.Ransom.Pipaki.6
AvastWin32:Evo-gen [Susp]
RisingTrojan.Injector!1.DF63 (CLASSIC)
Ad-AwareGen:Variant.Ransom.Pipaki.6
EmsisoftGen:Variant.Ransom.Pipaki.6 (B)
VIPREGen:Variant.Ransom.Pipaki.6
McAfee-GW-EditionBehavesLike.Win32.Dropper.ch
Trapminemalicious.high.ml.score
FireEyeGeneric.mg.0b1b688881b4d690
SophosGeneric ML PUA (PUA)
IkarusTrojan-Ransom.FileCrypter
AviraHEUR/AGEN.1238400
MicrosoftProgram:Win32/Wacapew.C!ml
ArcabitTrojan.Ransom.Pipaki.6
ZoneAlarmHEUR:Trojan-Ransom.Win32.Agent.gen
GDataGen:Variant.Ransom.Pipaki.6
AhnLab-V3Ransomware/Win.FILECODER.C5025693
Acronissuspicious
VBA32BScope.Trojan.Sabsik.TE
ALYacGen:Variant.Ransom.Pipaki.6
MAXmalware (ai score=86)
MalwarebytesRansom.FileCryptor
TencentWin32.Trojan.Filecoder.Eop
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Filecoder.OKG!tr.ransom
BitDefenderThetaAI:Packer.F18F446D21
AVGWin32:Evo-gen [Susp]
PandaTrj/GdSda.A
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Ransom.Pipaki.6?

Ransom.Pipaki.6 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment