Malware

Strictor.208277 information

Malware Removal

The Strictor.208277 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Strictor.208277 virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Reads data out of its own binary image
  • A process created a hidden window
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Uses Windows utilities for basic functionality
  • Executed a process and injected code into it, probably while unpacking
  • Deletes its original binary from disk
  • Steals private information from local Internet browsers
  • Exhibits behavior characteristic of Pony malware
  • Exhibits possible ransomware file modification behavior
  • Collects information about installed applications
  • Creates a hidden or system file
  • Detects the presence of Wine emulator via registry key
  • Checks the version of Bios, possibly for anti-virtualization
  • Detects VirtualBox through the presence of a registry key
  • Harvests credentials from local FTP client softwares
  • Harvests information related to installed mail clients

Related domains:

www.ptsinar.co

How to determine Strictor.208277?


File Info:

crc32: 9E573619
md5: 63533e07c471cf29ce6fc5887e933494
name: 63533E07C471CF29CE6FC5887E933494.mlw
sha1: 01eea47a0f55b7df7d8275110fa159e5b82be64e
sha256: 57933bc5c60de83fddbc7a2c6522e6481c9e684e342fed86a4c38bf08c4a6b0f
sha512: a3ad09374b933b11a26864d931fd5324443f68b15492767c44ad1da826e80f391796e8aeecc210bfd2c7d1facc72462fd3b96aa3a541eacf2a23e44026b820ec
ssdeep: 24576:cWx0LStFoJI75h0LqieDb49HqlfTbByCZTqqi9w:c6uJ2hbYHy0CCw
type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed

Version Info:

0: [No Data]

Strictor.208277 also known as:

BkavW32.AIDetect.malware2
K7AntiVirusTrojan ( 0049049a1 )
Elasticmalicious (high confidence)
DrWebTrojan.PWS.Stealer.1932
CynetMalicious (score: 100)
ALYacGen:Variant.Strictor.208277
CylanceUnsafe
ZillyaBackdoor.PePatch.Win32.84885
SangforTrojan.Win32.ATRAPS.Gen2
CrowdStrikewin/malicious_confidence_60% (D)
AlibabaBackdoor:Win32/Fynloski.d661808a
K7GWTrojan ( 0049049a1 )
Cybereasonmalicious.7c471c
SymantecTrojan.Gen.MBT
APEXMalicious
AvastWin32:Trojan-gen
ClamAVWin.Trojan.Generic-6290450-0
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.Strictor.208277
NANO-AntivirusTrojan.Win32.Fynloski.fgrrac
MicroWorld-eScanGen:Variant.Strictor.208277
TencentMalware.Win32.Gencirc.10b0ec73
Ad-AwareGen:Variant.Strictor.208277
SophosMal/Generic-S
ComodoMalware@#3d58uwdnym8yu
McAfee-GW-EditionBehavesLike.Win32.BadFile.tc
FireEyeGeneric.mg.63533e07c471cf29
EmsisoftGen:Variant.Strictor.208277 (B)
AviraTR/ATRAPS.Gen2
Antiy-AVLTrojan/Generic.ASMalwS.2022054
MicrosoftBackdoor:Win32/Fynloski
GDataGen:Variant.Strictor.208277
AhnLab-V3Backdoor/Win32.DarkKomet.R200267
McAfeeArtemis!63533E07C471
MAXmalware (ai score=100)
PandaTrj/Genetic.gen
FortinetW32/PatchedRarSfx.B!tr
AVGWin32:Trojan-gen
Paloaltogeneric.ml
Qihoo-360Win32/Backdoor.DarkKomet.HwsBEpsA

How to remove Strictor.208277?

Strictor.208277 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment