Categories: Ransom

Ransom:Win32/Reveton.A (file analysis)

The Ransom:Win32/Reveton.A is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Ransom:Win32/Reveton.A virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • A file was accessed within the Public folder.
  • Uses Windows utilities for basic functionality
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Behavioural detection: Injection (inter-process)
  • Behavioural detection: Injection with CreateRemoteThread in a remote process
  • CAPE detected the shellcode patterns malware family
  • Attempts to modify proxy settings
  • Attempts to modify browser security settings
  • Attempts to disable browser security warnings
  • Touches a file containing cookies, possibly for information gathering
  • Uses suspicious command line tools or Windows utilities
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Ransom:Win32/Reveton.A?


File Info:

name: 3147E13D43917F311559.mlwpath: /opt/CAPEv2/storage/binaries/4e6e274f1c1f14d17aa6b073071e9b30d68dcf9c35c791e3a1426640a26d2847crc32: 3E218F6Emd5: 3147e13d43917f3115594c33b85edaedsha1: 25877e7d6d987fbb740760d62eae49a5e2a9d1bdsha256: 4e6e274f1c1f14d17aa6b073071e9b30d68dcf9c35c791e3a1426640a26d2847sha512: f5c1af897a811d898870f72ceb88d1aba64a5967e600587ab87dd6675eaf64036af8c70a9d7398441107ef1ffda35c09561cb3d0e7c7e60a76cf73de9235c985ssdeep: 3072:IKwxbH6QNevJyItWDqWBnYdomYnozd7m83vv7/267bJVVLayQvknp7GbGhTe0Dg0:I9j6QohyItvAYeBnqdVn7//7bmxGh60Dtype: PE32 executable (DLL) (GUI) Intel 80386, for MS Windowstlsh: T1570412894E5DB87AE67287FA2E6B096328BBF3C486ED41F43D2B155EC5354C048C2B1Csha3_384: daa9e0c3831ab4fc5f11aefb478e0f4d70179744cf9d0b584589bdaea331de86e28bb9f1fdf1b533272ab5df4dbe9da4ep_bytes: 807c2408010f85b901000060be002041timestamp: 2011-03-19 09:07:19

Version Info:

CompanyName: Packard Bell BVFileDescription: Fault Gap Miner ReinsFileVersion: 7.1InternalName: Hood Tic ThatLegalCopyright: Envy Zesty Trips Ross 2001-2010OriginalFilename: Darwin.exeProductName: Flax Harry Lend Circe PouchProductVersion: 7.1Translation: 0x0409 0x04b0

Ransom:Win32/Reveton.A also known as:

Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Generic.4!c
tehtris Generic.Malware
MicroWorld-eScan Gen:Variant.Barys.1483
FireEye Generic.mg.3147e13d43917f31
Skyhigh BehavesLike.Win32.Trojan.cc
McAfee Generic BackDoor.vj
Cylance unsafe
Zillya Trojan.Zbot.Win32.48676
Sangfor Trojan.Win32.Kazy.bruk
K7AntiVirus Password-Stealer ( 003c6e581 )
Alibaba Trojan:Win32/Kryptik.f7fade69
K7GW Password-Stealer ( 003c6e581 )
CrowdStrike win/malicious_confidence_100% (D)
Symantec ML.Attribute.HighConfidence
Elastic malicious (moderate confidence)
ESET-NOD32 a variant of Win32/Kryptik.XUJ
Cynet Malicious (score: 100)
APEX Malicious
ClamAV Win.Trojan.Zbot-16206
Kaspersky UDS:DangerousObject.Multi.Generic
BitDefender Gen:Variant.Barys.1483
NANO-Antivirus Trojan.Win32.Reveton.jjwch
Avast Win32:Evo-gen [Trj]
Emsisoft Gen:Variant.Barys.1483 (B)
F-Secure Trojan.TR/Crypt.ZPACK.Gen2
DrWeb Trojan.Inject.59375
VIPRE Gen:Variant.Barys.1483
TrendMicro TROJ_FRS.0NA103BL20
Sophos Mal/EncPk-ACN
Ikarus Trojan.Win32.Ransom
Jiangmin TrojanSpy.Zbot.bknc
Webroot W32.Trojan.Gen
Varist W32/Reveton.Q.gen!Eldorado
Avira TR/Crypt.ZPACK.Gen2
MAX malware (ai score=100)
Antiy-AVL Trojan/Win32.Generic
Kingsoft malware.kb.b.841
Microsoft Ransom:Win32/Reveton.A
Xcitium TrojWare.Win32.Kryptik.ZMNA@4mox0e
Arcabit Trojan.Barys.D5CB
ZoneAlarm UDS:DangerousObject.Multi.Generic
GData Gen:Variant.Barys.1483
Google Detected
AhnLab-V3 Trojan/Win32.Agent.R17000
BitDefenderTheta Gen:NN.ZedlaF.36744.kmSfayes!Ugi
ALYac Gen:Variant.Barys.1483
Panda Generic Malware
TrendMicro-HouseCall TROJ_FRS.0NA103BL20
Rising Trojan.Generic!8.C3 (TFE:5:rrjPpnZ0ZPS)
Yandex Trojan.GenAsa!S2tW7CfY0GE
SentinelOne Static AI – Malicious PE
MaxSecure Trojan.Malware.3411397.susgen
Fortinet W32/Zbot.CTPB!tr
AVG Win32:Evo-gen [Trj]
DeepInstinct MALICIOUS

How to remove Ransom:Win32/Reveton.A?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

MSIL/GenKryptik.GXIZ information

The MSIL/GenKryptik.GXIZ is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago

Malware.AI.2789448175 (file analysis)

The Malware.AI.2789448175 is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago

Jalapeno.1878 removal instruction

The Jalapeno.1878 is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago

What is “Trojan.Heur3.LPT.YmKfaKBcBekib”?

The Trojan.Heur3.LPT.YmKfaKBcBekib is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago

How to remove “Worm.Win32.Vobfus.exmt”?

The Worm.Win32.Vobfus.exmt is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago

About “TrojanDownloader:Win32/Beebone.JO” infection

The TrojanDownloader:Win32/Beebone.JO is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago