Ransom

Ransom:Win32/GandCrab.MTE!bit malicious file

Malware Removal

The Ransom:Win32/GandCrab.MTE!bit is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Ransom:Win32/GandCrab.MTE!bit virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection with CreateRemoteThread in a remote process
  • Creates RWX memory
  • Mimics the system’s user agent string for its own requests
  • A process attempted to delay the analysis task.
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • Performs some HTTP requests
  • Unconventionial language used in binary resources: Estonian
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Detects Sandboxie through the presence of a library
  • Detects the presence of Wine emulator via function name
  • Deletes its original binary from disk
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Installs itself for autorun at Windows startup
  • Attempts to identify installed analysis tools by a known file location
  • Checks for the presence of known devices from debuggers and forensic tools
  • Detects the presence of Wine emulator via registry key
  • Detects Sandboxie using a known mutex
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Checks for a known DeepFreeze Frozen State Mutex
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz
ioxicjkdkc.abkhazia.su
edgedl.gvt1.com
dfsj4i9jifgdf.xyz

How to determine Ransom:Win32/GandCrab.MTE!bit?


File Info:

crc32: 5B0E3295
md5: c16df5c2bc61fc47e8f051aed9be5fca
name: C16DF5C2BC61FC47E8F051AED9BE5FCA.mlw
sha1: 7363bf760026609f73e33c6750234b390a21ffe7
sha256: 07ac15e96a525a2b0e35d441a18628a90dccae67bc4f6c2b354aa1db375a252e
sha512: 57ae80dd233b1e85fd7189943ecb9da36c844999fb4e60774fe2741dff7d87748b2c3a3ba1f41e51e0c97d956cf147e62b5408bc5de818c92a5db17a6f15d031
ssdeep: 3072:IHrVLPg9bo75xmPoel7QCRLQ1gcJV83p+at6mXA7:0VLo9wkljQeD3am8
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

Translation: 0x0809 0x04b0

Ransom:Win32/GandCrab.MTE!bit also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
DrWebTrojan.Encoder.24384
MicroWorld-eScanGen:Variant.ClipBanker.215
CAT-QuickHealTrojan.Chapak.ZZ5
ALYacGen:Variant.ClipBanker.215
CylanceUnsafe
AegisLabTrojan.Win32.Chapak.4!c
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (D)
BitDefenderGen:Variant.ClipBanker.215
K7GWTrojan ( 0053305e1 )
K7AntiVirusTrojan ( 0053305e1 )
BitDefenderThetaAI:Packer.9FBBAE3920
CyrenW32/S-8106a1e5!Eldorado
SymantecPacked.Generic.525
APEXMalicious
AvastWin32:Kryptik-PQE [Trj]
KasperskyHEUR:Trojan.Win32.Generic
AlibabaRansom:Win32/GandCrab.206fb90f
NANO-AntivirusTrojan.Win32.Coins.ffkuce
ViRobotTrojan.Win32.U.Agent.181760.A
Ad-AwareGen:Variant.ClipBanker.215
SophosMal/Generic-R + Mal/GandCrab-B
ComodoTrojWare.Win32.PSW.Coins.AK@7u6yd3
F-SecureHeuristic.HEUR/AGEN.1102756
ZillyaTrojan.GenericKD.Win32.136941
TrendMicroRansom_GANDCRAB.SMALY-3
McAfee-GW-EditionBehavesLike.Win32.Generic.ch
FireEyeGeneric.mg.c16df5c2bc61fc47
EmsisoftGen:Variant.ClipBanker.215 (B)
IkarusTrojan.Win32.Crypt
JiangminTrojan.PSW.Coins.agx
MaxSecureRansomeware.GandCrypt.Gen
AviraHEUR/AGEN.1102756
Antiy-AVLTrojan/Win32.Vigorf
MicrosoftRansom:Win32/GandCrab.MTE!bit
ArcabitTrojan.ClipBanker.215
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataGen:Variant.ClipBanker.215
CynetMalicious (score: 100)
AhnLab-V3Win-Trojan/Gandcrab04.Exp
Acronissuspicious
McAfeePacked-FJN!C16DF5C2BC61
MAXmalware (ai score=97)
VBA32BScope.TrojanDownloader.Bandit
MalwarebytesTrojan.MalPack.Generic
PandaTrj/CI.A
ESET-NOD32a variant of Win32/Kryptik.GIXT
TrendMicro-HouseCallRansom_GANDCRAB.SMALY-3
RisingRansom.GandCrypt!8.F33E (CLOUD)
YandexTrojan.Agent!sFIsyB66BsU
SentinelOneStatic AI – Malicious PE
FortinetW32/Kryptik.GKJF!tr
AVGWin32:Kryptik-PQE [Trj]
Cybereasonmalicious.2bc61f
Paloaltogeneric.ml
Qihoo-360Win32/Trojan.876

How to remove Ransom:Win32/GandCrab.MTE!bit?

Ransom:Win32/GandCrab.MTE!bit removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment