Ransom

Ransom:Win32/Phobos.PM removal tips

Malware Removal

The Ransom:Win32/Phobos.PM is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Ransom:Win32/Phobos.PM virus can do?

  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Enumerates running processes
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Installs itself for autorun at Windows startup
  • CAPE detected the Phobos malware family
  • Creates a copy of itself
  • Anomalous binary characteristics

How to determine Ransom:Win32/Phobos.PM?


File Info:

name: 7B2EB5D40D7E9102D8D1.mlw
path: /opt/CAPEv2/storage/binaries/c544daa7a7c0bb52ab74e222bbf66d4da14e444ebcea762974c4443d476589d3
crc32: 042030AD
md5: 7b2eb5d40d7e9102d8d17e358a828353
sha1: 344ed5033c549cdc1ac6be1283f13b7e47702f23
sha256: c544daa7a7c0bb52ab74e222bbf66d4da14e444ebcea762974c4443d476589d3
sha512: 424333c6f11620313003426d1ec79f0e2bba5fd6ad3597c8f192c8c94970bcb42ae7373ac1e30770401361c8761a417a04da7906c26c3bbdbcfb01560159802e
ssdeep: 1536:JN/RBl5PT/rx1mzwRMSTdLpJn1ZovysVw1QHY:JDRrmzwR5J1+vyfm
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1D143B006706990B2CDB285702A3B2F5F4FBE551144B484478F3A8E863ED5536EB3B376
sha3_384: bb11d8252cfc5412ac0f18c88c0c871cca4ba039a4c78c98a788833d4d889f7c0170d7fb7539258541ff517bf545c310
ep_bytes: e849faffff6a00ff156ca04000cc558b
timestamp: 2020-03-31 14:17:25

Version Info:

0: [No Data]

Ransom:Win32/Phobos.PM also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
CynetMalicious (score: 100)
CAT-QuickHealRansom.Phobos.S11618290
McAfeeRansom-Phobos!7B2EB5D40D7E
CylanceUnsafe
CrowdStrikewin/malicious_confidence_100% (D)
BitDefenderGen:Variant.Ransom.Phobos.62
K7GWTrojan ( 00564fee1 )
K7AntiVirusTrojan ( 00564fee1 )
CyrenW32/Ransom.NA.gen!Eldorado
SymantecRansom.Phobos!gm1
ESET-NOD32a variant of Win32/Filecoder.Phobos.C
APEXMalicious
ClamAVWin.Ransomware.Ulise-7594403-0
KasperskyHEUR:Trojan.Win32.Generic
NANO-AntivirusTrojan.Win32.Filecoder.himsij
MicroWorld-eScanGen:Variant.Ransom.Phobos.62
TencentTrojan.Win32.Phobos.fa
EmsisoftGen:Variant.Ransom.Phobos.62 (B)
F-SecureTrojan.TR/Crypt.XPACK.Gen
DrWebTrojan.Encoder.31543
TrendMicroRansom.Win32.CRYSIS.SMA
McAfee-GW-EditionBehavesLike.Win32.Generic.qc
FireEyeGeneric.mg.7b2eb5d40d7e9102
SophosML/PE-A + Troj/Phobos-B
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Generic.ervnl
AviraTR/Crypt.XPACK.Gen
Antiy-AVLTrojan/Generic.ASMalwS.303731A
MicrosoftRansom:Win32/Phobos.PM
ViRobotTrojan.Win32.Ransom.56832.K
GDataGen:Variant.Ransom.Phobos.62
AhnLab-V3Trojan/Win32.RL_Generic.R363595
VBA32BScope.TrojanRansom.Phobos
ALYacGen:Variant.Ransom.Phobos.62
MAXmalware (ai score=81)
MalwarebytesRansom.Phobos
PandaTrj/Genetic.gen
TrendMicro-HouseCallRansom.Win32.CRYSIS.SMA
RisingRansom.Phobos!1.C277 (RDMK:cmRtazprDROx0+MP3yI3k9gNOOVh)
YandexTrojan.GenAsa!oSQlCZwLKgc
IkarusTrojan-Ransom.Phobos
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Generic.AP.34AB98!tr
BitDefenderThetaGen:NN.ZexaF.34182.duW@aSzg6cd
AVGWin32:Phobos-D [Ransom]
Cybereasonmalicious.40d7e9
AvastWin32:Phobos-D [Ransom]

How to remove Ransom:Win32/Phobos.PM?

Ransom:Win32/Phobos.PM removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment