Ransom

Ransom:Win32/Gandcrab.RPS!MTB information

Malware Removal

The Ransom:Win32/Gandcrab.RPS!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Ransom:Win32/Gandcrab.RPS!MTB virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Anomalous file deletion behavior detected (10+)
  • Dynamic (imported) function loading detected
  • Performs HTTP requests potentially not found in PCAP.
  • Enumerates running processes
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Czech
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Steals private information from local Internet browsers
  • Collects information about installed applications
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Attempts to modify proxy settings
  • Harvests cookies for information gathering
  • Harvests credentials from local FTP client softwares
  • Harvests information related to installed instant messenger clients
  • Harvests information related to installed mail clients
  • Collects information to fingerprint the system

How to determine Ransom:Win32/Gandcrab.RPS!MTB?


File Info:

name: 337F97B4013876534AF3.mlw
path: /opt/CAPEv2/storage/binaries/df312bb32034185a3f1eb2ce0fb6cc08286da30179c62f5d9c8ae1baac7ebfdb
crc32: 8C3125FD
md5: 337f97b4013876534af3dbccc1881528
sha1: 62004fab6bf61c6f7a21bb009597b64c050ab76c
sha256: df312bb32034185a3f1eb2ce0fb6cc08286da30179c62f5d9c8ae1baac7ebfdb
sha512: 3c85b11e36f1d5d2df5865a1f63294203b2f1b77b128204e614ddb6e89c2ee937d4646b881b3ebb3ef8440e3c731acf0789a5cf72696b741e8dd5e3840ab1df4
ssdeep: 12288:asoJJL5BJbPowSQLxdzX+e1L39Z4KglmmzZo/aZ4/dTE/JMcadh6M3yoMLm:gFBJbPowSQLxZ1LtZPVg+/3/W6c86M3P
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T165E40126A3C0C079DC92B179C0A5CBF04D967C31C4525A8F2AD97DB9BB74AF59224F0B
sha3_384: a2d21ad557f8d92898c3413323ee69e8fe97d6e05544f5d5463fdad99cdfd2e72a130c7ddd1f8d697a2e1c2accddd328
ep_bytes: e8791b0000e979feffff8bff558bec83
timestamp: 2018-04-08 06:35:32

Version Info:

0: [No Data]

Ransom:Win32/Gandcrab.RPS!MTB also known as:

BkavW32.AIDetect.malware1
MicroWorld-eScanTrojan.BrsecmonE.1
FireEyeGeneric.mg.337f97b401387653
ALYacTrojan.BrsecmonE.1
CylanceUnsafe
VIPRETrojan.BrsecmonE.1
SangforTrojan.Win32.Save.a
Cybereasonmalicious.401387
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Kryptik.GRRG
APEXMalicious
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderTrojan.BrsecmonE.1
NANO-AntivirusTrojan.Win32.Encoder.fovadm
AvastWin32:MalwareX-gen [Trj]
Ad-AwareTrojan.BrsecmonE.1
EmsisoftTrojan.BrsecmonE.1 (B)
DrWebTrojan.Encoder.24384
TrendMicroTrojan.Win32.SODINOK.SM.hp
McAfee-GW-EditionBehavesLike.Win32.Dropper.jh
Trapminemalicious.high.ml.score
SophosML/PE-A
SentinelOneStatic AI – Malicious PE
GDataTrojan.BrsecmonE.1
AviraHEUR/AGEN.1209924
MAXmalware (ai score=88)
ArcabitTrojan.BrsecmonE.1
MicrosoftRansom:Win32/Gandcrab.RPS!MTB
CynetMalicious (score: 100)
AhnLab-V3Win-Trojan/MalPe2.Suspicious.X1937
Acronissuspicious
McAfeePacked-FSF!337F97B40138
VBA32BScope.Trojan.Fuerboos
MalwarebytesMalware.Heuristic.1006
TrendMicro-HouseCallTrojan.Win32.SODINOK.SM.hp
RisingTrojan.Generic@AI.97 (RDML:oPiMqMWL+nggFFBJetwYpg)
IkarusTrojan.Win32.Krypt
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.GRWA!tr
BitDefenderThetaGen:NN.ZexaF.34742.QuW@aqcJ!GjG
AVGWin32:MalwareX-gen [Trj]
PandaTrj/GdSda.A
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Ransom:Win32/Gandcrab.RPS!MTB?

Ransom:Win32/Gandcrab.RPS!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment