Malware

Strictor.240399 (B) information

Malware Removal

The Strictor.240399 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Strictor.240399 (B) virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • Expresses interest in specific running processes
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • The binary likely contains encrypted or compressed data.
  • Deletes its original binary from disk
  • Checks for the presence of known windows from debuggers and forensic tools
  • The following process appear to have been packed with Themida: 4.exe, plugin.exe
  • Installs itself for autorun at Windows startup
  • Checks for the presence of known devices from debuggers and forensic tools
  • Detects the presence of Wine emulator via registry key
  • Checks the version of Bios, possibly for anti-virtualization
  • Detects VirtualBox through the presence of a registry key
  • Creates a copy of itself
  • Anomalous binary characteristics

Related domains:

lodddd01.info
lodddd02.info

How to determine Strictor.240399 (B)?


File Info:

crc32: 973D2A14
md5: aa3390ae3e7f2b4c8b2b557d688a23ce
name: 4.exe
sha1: 5db6e1a9ee95ac2d99bf8c90b02999ae3e48d358
sha256: 11e07f3b726c1847708409318798056e757510264c197e8d3c66ca45cc3c04aa
sha512: f837cfe7424adf4c051aabb4ff7d45d665be8dd312c369277223626de01b873ee4aed68f0f8204e09cbc878a306a59d0499dd786b1288faac5081fdb5a287d09
ssdeep: 24576:+5sMQmw/lH+PZhxS042jJWPqx7F1BAzGTJej1sEIBsgYW+rraeDy20thsz9HIty:+qRsnxHjwPIkK3BxYXaeXuWz9otyhH
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Strictor.240399 (B) also known as:

BkavW32.HfsAutoB.
DrWebTrojan.Siggen9.12563
MicroWorld-eScanGen:Variant.Strictor.240399
FireEyeGeneric.mg.aa3390ae3e7f2b4c
Qihoo-360Generic/Backdoor.990
McAfeeArtemis!AA3390AE3E7F
CylanceUnsafe
SangforMalware
CrowdStrikewin/malicious_confidence_100% (W)
BitDefenderGen:Variant.Strictor.240399
K7GWTrojan ( 0040f4ef1 )
K7AntiVirusTrojan ( 0040f4ef1 )
ArcabitTrojan.Strictor.D3AB0F
Invinceaheuristic
BitDefenderThetaGen:NN.ZexaF.34090.1zWaaK0Oltp
CyrenW32/Trojan.ANXS-6254
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Packed.Themida.HIG
APEXMalicious
Paloaltogeneric.ml
KasperskyHEUR:Backdoor.MSIL.Generic
AlibabaPacked:Win32/Themida.91d2e963
AvastWin32:PWSX-gen [Trj]
TencentWin32.Trojan.Agent.Lmkh
Ad-AwareGen:Variant.Strictor.240399
SophosMal/Generic-S
F-SecureTrojan.TR/Crypt.TPM.Gen
TrendMicroTROJ_FRS.VSNTBH20
McAfee-GW-EditionBehavesLike.Win32.Generic.tc
FortinetPossibleThreat.MU
Trapminemalicious.high.ml.score
EmsisoftGen:Variant.Strictor.240399 (B)
SentinelOneDFI – Malicious PE
WebrootW32.Trojan.Gen
AviraTR/Crypt.TPM.Gen
MAXmalware (ai score=100)
Endgamemalicious (high confidence)
MicrosoftTrojan:Win32/Occamy.C
ZoneAlarmHEUR:Backdoor.MSIL.Generic
Acronissuspicious
VBA32BScope.Trojan-Dropper.Inject
TrendMicro-HouseCallTROJ_FRS.VSNTBH20
RisingTrojan.Occamy!8.F1CD (CLOUD)
IkarusTrojan.Win32.Themida
GDataGen:Variant.Strictor.240399
AVGWin32:PWSX-gen [Trj]
Cybereasonmalicious.9ee95a
PandaTrj/Genetic.gen

How to remove Strictor.240399 (B)?

Strictor.240399 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment