Ransom

Ransom:Win32/Tosthin.A removal

Malware Removal

The Ransom:Win32/Tosthin.A is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Ransom:Win32/Tosthin.A virus can do?

  • Attempts to connect to a dead IP:Port (4 unique times)
  • Possible date expiration check, exits too soon after checking local time
  • A process attempted to delay the analysis task.
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • A process created a hidden window
  • Drops a binary and executes it
  • Performs some HTTP requests
  • Uses Windows utilities for basic functionality
  • Deletes its original binary from disk
  • Installs itself for autorun at Windows startup
  • Writes a potential ransom message to disk
  • Creates a hidden or system file
  • Creates a copy of itself
  • Collects information to fingerprint the system
  • Uses suspicious command line tools or Windows utilities

Related domains:

z.whorecord.xyz
a.tomx.xyz
2no.co
iplogger.org

How to determine Ransom:Win32/Tosthin.A?


File Info:

crc32: 407C7398
md5: f9df5fccbdbd1b2aecce88c541a221b9
name: F9DF5FCCBDBD1B2AECCE88C541A221B9.mlw
sha1: fb2549ceeb8495e1e009f3479a9ec01c091e5851
sha256: 498afae75c004e05b77f3b45cdf7b700c5d90ac810d3debc32e14e1dc02fabf2
sha512: e848e57ff4726fd4bd718bbd38d6cedb8b647bb491d11f95292a5114090ed61cdbe6669010815acbad05c4f67bd35b89150b610f5b489f7e789dfa1c44391ba0
ssdeep: 6144:3B+MCQzRSOeeVrSBObfxn30XENm2eK7mnoUSgpAY8ODcDcm7cIs0/Nx/N3o8oG7:JhnkK/P/RtwhDDL
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Ransom:Win32/Tosthin.A also known as:

BkavW32.AIDetect.malware2
K7AntiVirusTrojan ( 0053b7601 )
Elasticmalicious (high confidence)
CynetMalicious (score: 100)
ALYacTrojan.Ransom.Pico
CylanceUnsafe
ZillyaTrojan.GenericKD.Win32.193363
SangforTrojan.Win32.Save.a
AlibabaRansom:Win32/Tosthin.27626586
K7GWTrojan ( 0053b7601 )
Cybereasonmalicious.cbdbd1
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Filecoder.NSA
APEXMalicious
AvastWin32:MalwareX-gen [Trj]
KasperskyTrojan-Ransom.Win32.Encoder.kv
BitDefenderGeneric.Ransom.Thanatos.46AED6B9
NANO-AntivirusTrojan.Win32.Encoder.fhnjjk
MicroWorld-eScanGeneric.Ransom.Thanatos.46AED6B9
TencentMalware.Win32.Gencirc.10cbe779
Ad-AwareGeneric.Ransom.Thanatos.46AED6B9
SophosMal/Generic-R + Troj/Ransom-FAJ
ComodoMalware@#1v7kqrs8hhjry
BitDefenderThetaGen:NN.ZexaF.34692.ouW@aCjzHmni
VIPRETrojan.Win32.Generic!BT
McAfee-GW-EditionBehavesLike.Win32.Generic.dh
FireEyeGeneric.mg.f9df5fccbdbd1b2a
EmsisoftTrojan.FileCoder (A)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Generic.cpowq
AviraHEUR/AGEN.1109036
Antiy-AVLTrojan/Generic.ASMalwS.284EE67
MicrosoftRansom:Win32/Tosthin.A
AegisLabTrojan.Win32.Generic.4!c
GDataGeneric.Ransom.Thanatos.46AED6B9
AhnLab-V3Malware/Win32.Generic.C2730026
McAfeeGenericRXAA-AA!F9DF5FCCBDBD
VBA32BScope.TrojanRansom.Gen
MalwarebytesRansom.Pico
PandaTrj/GdSda.A
RisingTrojan.Generic@ML.92 (RDMK:LEPi11YQCwLP8DbrlZj85w)
YandexTrojan.GenAsa!2iwT0RajCa8
IkarusTrojan-Ransom.FileCrypter
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/Filecoder.NSA!tr.ransom
AVGWin32:MalwareX-gen [Trj]
Paloaltogeneric.ml

How to remove Ransom:Win32/Tosthin.A?

Ransom:Win32/Tosthin.A removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment