Categories: Ransom

Ransom:Win32/GandCrab.MTE!bit malicious file

The Ransom:Win32/GandCrab.MTE!bit is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Ransom:Win32/GandCrab.MTE!bit virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection with CreateRemoteThread in a remote process
  • Creates RWX memory
  • Mimics the system’s user agent string for its own requests
  • A process attempted to delay the analysis task.
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • Performs some HTTP requests
  • Unconventionial language used in binary resources: Estonian
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Detects Sandboxie through the presence of a library
  • Detects the presence of Wine emulator via function name
  • Deletes its original binary from disk
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Installs itself for autorun at Windows startup
  • Attempts to identify installed analysis tools by a known file location
  • Checks for the presence of known devices from debuggers and forensic tools
  • Detects the presence of Wine emulator via registry key
  • Detects Sandboxie using a known mutex
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Checks for a known DeepFreeze Frozen State Mutex
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz
ioxicjkdkc.abkhazia.su
edgedl.gvt1.com
dfsj4i9jifgdf.xyz

How to determine Ransom:Win32/GandCrab.MTE!bit?


File Info:

crc32: 5B0E3295md5: c16df5c2bc61fc47e8f051aed9be5fcaname: C16DF5C2BC61FC47E8F051AED9BE5FCA.mlwsha1: 7363bf760026609f73e33c6750234b390a21ffe7sha256: 07ac15e96a525a2b0e35d441a18628a90dccae67bc4f6c2b354aa1db375a252esha512: 57ae80dd233b1e85fd7189943ecb9da36c844999fb4e60774fe2741dff7d87748b2c3a3ba1f41e51e0c97d956cf147e62b5408bc5de818c92a5db17a6f15d031ssdeep: 3072:IHrVLPg9bo75xmPoel7QCRLQ1gcJV83p+at6mXA7:0VLo9wkljQeD3am8type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

Translation: 0x0809 0x04b0

Ransom:Win32/GandCrab.MTE!bit also known as:

Bkav W32.AIDetect.malware1
Elastic malicious (high confidence)
DrWeb Trojan.Encoder.24384
MicroWorld-eScan Gen:Variant.ClipBanker.215
CAT-QuickHeal Trojan.Chapak.ZZ5
ALYac Gen:Variant.ClipBanker.215
Cylance Unsafe
AegisLab Trojan.Win32.Chapak.4!c
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (D)
BitDefender Gen:Variant.ClipBanker.215
K7GW Trojan ( 0053305e1 )
K7AntiVirus Trojan ( 0053305e1 )
BitDefenderTheta AI:Packer.9FBBAE3920
Cyren W32/S-8106a1e5!Eldorado
Symantec Packed.Generic.525
APEX Malicious
Avast Win32:Kryptik-PQE [Trj]
Kaspersky HEUR:Trojan.Win32.Generic
Alibaba Ransom:Win32/GandCrab.206fb90f
NANO-Antivirus Trojan.Win32.Coins.ffkuce
ViRobot Trojan.Win32.U.Agent.181760.A
Ad-Aware Gen:Variant.ClipBanker.215
Sophos Mal/Generic-R + Mal/GandCrab-B
Comodo TrojWare.Win32.PSW.Coins.AK@7u6yd3
F-Secure Heuristic.HEUR/AGEN.1102756
Zillya Trojan.GenericKD.Win32.136941
TrendMicro Ransom_GANDCRAB.SMALY-3
McAfee-GW-Edition BehavesLike.Win32.Generic.ch
FireEye Generic.mg.c16df5c2bc61fc47
Emsisoft Gen:Variant.ClipBanker.215 (B)
Ikarus Trojan.Win32.Crypt
Jiangmin Trojan.PSW.Coins.agx
MaxSecure Ransomeware.GandCrypt.Gen
Avira HEUR/AGEN.1102756
Antiy-AVL Trojan/Win32.Vigorf
Microsoft Ransom:Win32/GandCrab.MTE!bit
Arcabit Trojan.ClipBanker.215
ZoneAlarm HEUR:Trojan.Win32.Generic
GData Gen:Variant.ClipBanker.215
Cynet Malicious (score: 100)
AhnLab-V3 Win-Trojan/Gandcrab04.Exp
Acronis suspicious
McAfee Packed-FJN!C16DF5C2BC61
MAX malware (ai score=97)
VBA32 BScope.TrojanDownloader.Bandit
Malwarebytes Trojan.MalPack.Generic
Panda Trj/CI.A
ESET-NOD32 a variant of Win32/Kryptik.GIXT
TrendMicro-HouseCall Ransom_GANDCRAB.SMALY-3
Rising Ransom.GandCrypt!8.F33E (CLOUD)
Yandex Trojan.Agent!sFIsyB66BsU
SentinelOne Static AI – Malicious PE
Fortinet W32/Kryptik.GKJF!tr
AVG Win32:Kryptik-PQE [Trj]
Cybereason malicious.2bc61f
Paloalto generic.ml
Qihoo-360 Win32/Trojan.876

How to remove Ransom:Win32/GandCrab.MTE!bit?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

MSIL/GenKryptik.GXIZ information

The MSIL/GenKryptik.GXIZ is considered dangerous by lots of security experts. When this infection is active,…

3 weeks ago

Malware.AI.2789448175 (file analysis)

The Malware.AI.2789448175 is considered dangerous by lots of security experts. When this infection is active,…

3 weeks ago

Jalapeno.1878 removal instruction

The Jalapeno.1878 is considered dangerous by lots of security experts. When this infection is active,…

3 weeks ago

What is “Trojan.Heur3.LPT.YmKfaKBcBekib”?

The Trojan.Heur3.LPT.YmKfaKBcBekib is considered dangerous by lots of security experts. When this infection is active,…

3 weeks ago

How to remove “Worm.Win32.Vobfus.exmt”?

The Worm.Win32.Vobfus.exmt is considered dangerous by lots of security experts. When this infection is active,…

3 weeks ago

About “TrojanDownloader:Win32/Beebone.JO” infection

The TrojanDownloader:Win32/Beebone.JO is considered dangerous by lots of security experts. When this infection is active,…

3 weeks ago