Ransom

About “Ransom.Prometheus.1” infection

Malware Removal

The Ransom.Prometheus.1 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Ransom.Prometheus.1 virus can do?

  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid

How to determine Ransom.Prometheus.1?


File Info:

name: E16B2BAE3E58B8BB474F.mlw
path: /opt/CAPEv2/storage/binaries/80a649d2234fb4ec421e51ad68d9cd2442e3c2bb2448331f47653f6b1eed27ce
crc32: 6ED231ED
md5: e16b2bae3e58b8bb474f62ea1b2dc08d
sha1: 41547d9b30b904991d76f525feda0a24a14447ee
sha256: 80a649d2234fb4ec421e51ad68d9cd2442e3c2bb2448331f47653f6b1eed27ce
sha512: 3c7a145d1fc68ad01f160154554490157ef564c0f6ae7547941e852638de3cc20dd221667be32fb2c94fd624bd88a16cd2faff86ebbfa8287afe6386d03d99af
ssdeep: 49152:rEYznjiEmtQS0X5kzhHo+zc48v6AsJ/e:rJnhhX5y1T8+
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T187A5BE067E44CE11F0181633C2EF4A5847B4A951AAA6E33B7DFA336E55123A77C0D9CB
sha3_384: c1fafd2e220e07d292163e50e93c879c9abdea2be6cd8267bfa48b66690b68030d5526cfa389ceed6807564bdf2a1cb7
ep_bytes: ff250020400000000000000000000000
timestamp: 2022-07-24 15:13:08

Version Info:

ProductName: D9B53Pv2uoPsb8
CompanyName: A3heER6hzEtjE
InternalName: YGvTlG8JbdOJFKrAWrKqCEi.exe
LegalCopyright: qJHTR1YolGHwrRE1w1
Comments: DO5M
OriginalFilename: MllBufzTpK3p9g15Nhw8CBu.exe
ProductVersion: 966.203.70.501
FileVersion: 264.135.847.54
Translation: 0x0409 0x0514

Ransom.Prometheus.1 also known as:

BkavW32.AIDetectMalware.CS
tehtrisGeneric.Malware
MicroWorld-eScanGen:Variant.Ransom.Prometheus.1
CAT-QuickHealTrojan.DCRat.S29707587
SkyhighBehavesLike.Win32.Generic.vc
McAfeeTrojan-FUJL!E16B2BAE3E58
MalwarebytesGeneric.Spyware.Stealer.DDS
VIPREGen:Variant.Ransom.Prometheus.1
SangforSuspicious.Win32.Save.a
K7AntiVirusSpyware ( 0058ec321 )
K7GWSpyware ( 0058ec321 )
Cybereasonmalicious.b30b90
ArcabitTrojan.Ransom.Prometheus.1
VirITTrojan.Win32.MSIL_Heur.A
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of MSIL/Spy.Agent.DTP
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Packed.Basic-9952747-0
KasperskyHEUR:Trojan-Spy.MSIL.Stealer.gen
BitDefenderGen:Variant.Ransom.Prometheus.1
AvastWin32:RATX-gen [Trj]
TencentBackdoor.MSIL.Stealer.11025419
SophosTroj/DCRat-N
F-SecureHeuristic.HEUR/AGEN.1323984
DrWebTrojan.PWS.StealerNET.124
ZillyaTrojan.BasicGen.Win32.4
EmsisoftGen:Variant.Ransom.Prometheus.1 (B)
IkarusTrojan.MSIL.Injector
AviraHEUR/AGEN.1323984
Antiy-AVLTrojan[Spy]/MSIL.Stealer
Kingsoftmalware.kb.c.972
MicrosoftBackdoor:MSIL/DCRat!MTB
ZoneAlarmHEUR:Trojan-Spy.MSIL.Stealer.gen
GDataGen:Variant.Ransom.Prometheus.1
VaristW32/MSIL_Agent.LQ.gen!Eldorado
AhnLab-V3Trojan/Win.FUJL.C5130705
Acronissuspicious
BitDefenderThetaGen:NN.ZemsilF.36680.as0@aWqnlaii
ALYacGen:Variant.Ransom.Prometheus.1
Cylanceunsafe
PandaTrj/GdSda.A
RisingBackdoor.DCRat!8.129D9 (TFE:dGZlOg17w21gZmgvxA)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetMSIL/Agent.DVA!tr
AVGWin32:RATX-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Ransom.Prometheus.1?

Ransom.Prometheus.1 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment