Ransom

What is “Ransom.Shade.226”?

Malware Removal

The Ransom.Shade.226 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Ransom.Shade.226 virus can do?

  • Executable code extraction
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • Reads data out of its own binary image
  • The binary likely contains encrypted or compressed data.
  • Installs itself for autorun at Windows startup
  • Collects information about installed applications
  • Creates a hidden or system file
  • Network activity detected but not expressed in API logs
  • Creates a copy of itself
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine Ransom.Shade.226?


File Info:

crc32: EEF24405
md5: e1d7946e0431423da26d27e7fae00edf
name: sserv.jpg
sha1: f44ef7a71a8503d169e34fa9f80230b0f6cb36e2
sha256: d832010182a986629db10bf429f85fe659265360964bee1cbec2947cfc597b00
sha512: b211ffe1b419dacdfd8d17e4024e9f9eb3a8f384690fca4b8aa4715da28a25532891d666d988cb8aaa0811c1879c04d9ce475029bb3cc9404078c6373d37b9b3
ssdeep: 24576:XVoY+BrSL32adYkcsbvaNGyA5sGsX2ooKKaJ:XVorrazqqTaNvLNJ
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Ransom.Shade.226 also known as:

BkavW32.AIDetectVM.malware1
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Ransom.Shade.226
FireEyeGeneric.mg.e1d7946e0431423d
CAT-QuickHealTrojan.Mauvaise.SL1
McAfeeRansomware-GNS!E1D7946E0431
CylanceUnsafe
VIPRETrojan.Win32.Generic!BT
AegisLabTrojan.Win32.Generic.4!c
SangforMalware
K7AntiVirusRiskware ( 0040eff71 )
BitDefenderGen:Variant.Ransom.Shade.226
K7GWRiskware ( 0040eff71 )
Cybereasonmalicious.e04314
TrendMicroRansom.Win32.SHADE.THOAAEAI
BitDefenderThetaGen:NN.ZexaF.34298.bnX@aWh1ZJi
CyrenW32/Trojan.JKDH-3509
SymantecPacked.Generic.459
APEXMalicious
AvastWin32:DangerousSig [Trj]
KasperskyHEUR:Trojan.Win32.Generic
AlibabaTrojan:Win32/Emotet.00be6fd1
NANO-AntivirusTrojan.Win32.Encoder.fmerqu
ViRobotTrojan.Win32.Ransom.1073928.A
Ad-AwareGen:Variant.Ransom.Shade.226
SophosTroj/Troldesh-V
ComodoTrojWare.Win32.Troldesh.VA@88c8ev
F-SecureTrojan.TR/Crypt.ZPACK.afhu
DrWebTrojan.Encoder.27727
ZillyaTrojan.Shade.Win32.968
InvinceaMal/Generic-S + Troj/Troldesh-V
McAfee-GW-EditionRansomware-GNS!E1D7946E0431
EmsisoftTrojan-Ransom.Shade (A)
IkarusTrojan-Ransom.Crypted007
JiangminTrojan.Generic.cxbqg
MaxSecureTrojan.Malware.74065133.susgen
AviraTR/Crypt.ZPACK.afhu
MAXmalware (ai score=100)
Antiy-AVLTrojan[Ransom]/Win32.Shade
MicrosoftTrojan:Win32/Emotet.PB
ArcabitTrojan.Ransom.Shade.226
AhnLab-V3Trojan/Win32.Emotet.R271756
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataGen:Variant.Ransom.Shade.226
CynetMalicious (score: 100)
ESET-NOD32Win32/Filecoder.Shade.A
Acronissuspicious
VBA32BScope.Trojan.Dynamer
ALYacTrojan.Ransom.Shade
MalwarebytesRansom.Troldesh
PandaTrj/GdSda.A
TrendMicro-HouseCallRansom.Win32.SHADE.THOAAEAI
RisingTrojan.Kryptik!1.C745 (CLASSIC)
YandexTrojan.Shade!
SentinelOneDFI – Malicious PE
eGambitPE.Heur.InvalidSig
FortinetW32/Kryptik.GOUT!tr.ransom
WebrootW32.Trojan.Gen
AVGWin32:DangerousSig [Trj]
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_100% (W)
Qihoo-360Win32/Trojan.Ransom.751

How to remove Ransom.Shade.226?

Ransom.Shade.226 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment