Ransom

Should I remove “Ransom:Win32/Crysis.PB!MTB”?

Malware Removal

The Ransom:Win32/Crysis.PB!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Ransom:Win32/Crysis.PB!MTB virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection with CreateRemoteThread in a remote process
  • Creates RWX memory
  • Expresses interest in specific running processes
  • Drops a binary and executes it
  • Unconventionial language used in binary resources: Norwegian (Bokmal)
  • The binary likely contains encrypted or compressed data.
  • A scripting utility was executed
  • Attempts to remove evidence of file being downloaded from the Internet
  • Code injection with CreateRemoteThread in a remote process
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • Creates a copy of itself
  • Anomalous binary characteristics

Related domains:

netw.infiinite.com

How to determine Ransom:Win32/Crysis.PB!MTB?


File Info:

crc32: 6F5B4B04
md5: fc02f6ebfadb44e1ebbefb1066c6f32e
name: comhost.exe
sha1: 02e0f455a6ca4f01737d915bc3be06861b792105
sha256: 801f8b31a4f05051e0c7e7b69ede55d02537805c046092f0aafebe3ce3b0ceb9
sha512: 2b5530d25537478ddef2d05306cd0a6a2fa0de993151421a449f16fa9e5d8c947cbbfa4deaf37b19dd0e7d7f2a4fb95ca3ec3bb6c58dbba7585108ad752aec11
ssdeep: 3072:9QfXa/P7Atca/HZE0G/alGKkeYKB3y/3cvo1JySo3iYA27C9mv3epNG0:2a/Pm1m0G/1ehB3zvPzu2W9mv7
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

Translation: 0x0115 0x0099

Ransom:Win32/Crysis.PB!MTB also known as:

BkavW32.AIDetectVM.malware
MicroWorld-eScanTrojan.GenericKDZ.64948
FireEyeGeneric.mg.fc02f6ebfadb44e1
ALYacGen:Variant.Fugrafa.25794
CylanceUnsafe
CrowdStrikewin/malicious_confidence_90% (W)
BitDefenderTrojan.GenericKDZ.64948
K7GWTrojan ( 00560ea61 )
K7AntiVirusTrojan ( 00560ea61 )
TrendMicroRansom_Crysis.R002C0DBK20
CyrenW32/Kryptik.BDH.gen!Eldorado
SymantecML.Attribute.HighConfidence
TrendMicro-HouseCallRansom_Crysis.R002C0DBK20
AvastWin32:DropperX-gen [Drp]
ClamAVWin.Malware.Generic-7591172-0
GDataTrojan.GenericKDZ.64948
KasperskyExploit.Win32.Shellcode.oji
AlibabaRansom:Win32/Crysis.71c6711c
AegisLabTrojan.Win32.Fugrafa.4!c
APEXMalicious
Ad-AwareTrojan.GenericKDZ.64948
SophosMal/Generic-S
F-SecureTrojan.TR/Crypt.Agent.sfsee
Invinceaheuristic
McAfee-GW-EditionArtemis!Trojan
Trapminemalicious.moderate.ml.score
EmsisoftTrojan.GenericKDZ.64948 (B)
SentinelOneDFI – Malicious PE
F-ProtW32/Kryptik.BDH.gen!Eldorado
AviraTR/Crypt.Agent.sfsee
MAXmalware (ai score=80)
Endgamemalicious (high confidence)
ArcabitTrojan.Generic.DFDB4
ZoneAlarmExploit.Win32.Shellcode.oji
MicrosoftRansom:Win32/Crysis.PB!MTB
AhnLab-V3Trojan/Win.MalPe.X2054
Acronissuspicious
McAfeeTrojan-FRUV!FC02F6EBFADB
VBA32BScope.Backdoor.Agent
MalwarebytesTrojan.MalPack.GS
PandaTrj/Genetic.gen
ESET-NOD32a variant of Win32/Kryptik.HBFA
RisingTrojan.Obfuscated!1.9A68 (CLOUD)
IkarusTrojan-Banker.Emotet
FortinetW32/Kryptik.HBFA!tr
AVGWin32:DropperX-gen [Drp]
Cybereasonmalicious.5a6ca4
Paloaltogeneric.ml
Qihoo-360HEUR/QVM20.1.6159.Malware.Gen

How to remove Ransom:Win32/Crysis.PB!MTB?

Ransom:Win32/Crysis.PB!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment