Ransom

Ransom.Prometheus.1 removal instruction

Malware Removal

The Ransom.Prometheus.1 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Ransom.Prometheus.1 virus can do?

  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid

How to determine Ransom.Prometheus.1?


File Info:

name: 14D2C754BE45CAE33A2D.mlw
path: /opt/CAPEv2/storage/binaries/4a9a1627500b83fb4885be9a56a00c5b439c6bdbf74bb31123b62c9cbeb00fb0
crc32: 148AA948
md5: 14d2c754be45cae33a2d8051a97d5f53
sha1: 39c8cddc3555d0ddc6376e5ad1925c3985bc2820
sha256: 4a9a1627500b83fb4885be9a56a00c5b439c6bdbf74bb31123b62c9cbeb00fb0
sha512: a5eed85e261eaccbf9c76c15bfbabf6a11bacf65c4d8b5d7bd167564a92aafe4b5eead54bdb12707fab340505cb3dca72eb9207a1939f0b4fec393c2e7b5b3ed
ssdeep: 24576:7M9eoWAXhNdh789QSRB2hwaaiQ8UZSllu11rGN1lz+bw337+QJTm+My1k:7OeohNElTaUZSXujIWw3Sr0
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T118A5BF027E46CE51F0091233C2EF85484BB49D6166A6E72B7EBA3B7D15123977C0DACB
sha3_384: 6509fde90faa6918ed445074dffbff12977e2129c112a8e4961d6654fc293de4a1ed29f47268798410e01223c076aec5
ep_bytes: ff250020400000000000000000000000
timestamp: 2022-05-04 16:03:35

Version Info:

ProductName: 7kAKj6zg2qhRSQsP
CompanyName: RmpxnVId
InternalName: fY1UvhC3WQ.exe
LegalCopyright: GyuK
Comments: SLxzfOwarbdbxJV1iXSVv
OriginalFilename: gAOY4UJIcTYEuJY3j.exe
ProductVersion: 709.73.458.374
FileVersion: 928.495.36.838
Translation: 0x0409 0x0514

Ransom.Prometheus.1 also known as:

BkavW32.AIDetectMalware.CS
MicroWorld-eScanGen:Variant.Ransom.Prometheus.1
CAT-QuickHealTrojan.DCRat.S29707587
SkyhighBehavesLike.Win32.Generic.vc
McAfeeTrojan-FUJL!14D2C754BE45
MalwarebytesGeneric.Spyware.Stealer.DDS
VIPREGen:Variant.Ransom.Prometheus.1
SangforSuspicious.Win32.Save.a
K7GWSpyware ( 0058ec321 )
Cybereasonmalicious.4be45c
VirITTrojan.Win32.MSIL_Heur.A
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of MSIL/Spy.Agent.DTP
APEXMalicious
ClamAVWin.Packed.Msilmamut-9950860-0
KasperskyHEUR:Backdoor.MSIL.DCRat.gen
BitDefenderGen:Variant.Ransom.Prometheus.1
AvastWin32:RATX-gen [Trj]
TencentBackdoor.MSIL.Stealer.11025419
EmsisoftGen:Variant.Ransom.Prometheus.1 (B)
F-SecureHeuristic.HEUR/AGEN.1323984
DrWebTrojan.PWS.StealerNET.124
ZillyaTrojan.BasicGen.Win32.4
FireEyeGeneric.mg.14d2c754be45cae3
SophosTroj/DCRat-N
SentinelOneStatic AI – Malicious PE
MAXmalware (ai score=84)
GoogleDetected
AviraHEUR/AGEN.1323984
VaristW32/MSIL_Agent.LQ.gen!Eldorado
Kingsoftmalware.kb.c.960
MicrosoftBackdoor:MSIL/DCRat!MTB
ArcabitTrojan.Ransom.Prometheus.1
ZoneAlarmHEUR:Backdoor.MSIL.DCRat.gen
GDataGen:Variant.Ransom.Prometheus.1
AhnLab-V3Trojan/Win.FUJL.C5119684
Acronissuspicious
BitDefenderThetaGen:NN.ZemsilF.36802.as0@a0dUuIai
ALYacGen:Variant.Ransom.Prometheus.1
Cylanceunsafe
PandaTrj/GdSda.A
RisingBackdoor.DCRat!8.129D9 (TFE:dGZlOg17w21gZmgvxA)
IkarusTrojan.MSIL.Crypt
MaxSecureTrojan.Malware.300983.susgen
FortinetMSIL/Agent.DVA!tr
AVGWin32:RATX-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (D)
alibabacloudBackdoor:MSIL/Dcrat.A

How to remove Ransom.Prometheus.1?

Ransom.Prometheus.1 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment