Malware

Strictor.264540 removal guide

Malware Removal

The Strictor.264540 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Strictor.264540 virus can do?

  • Executable code extraction
  • A process attempted to delay the analysis task.
  • Reads data out of its own binary image
  • Performs some HTTP requests
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • Looks up the external IP address
  • Queries information on disks, possibly for anti-virtualization
  • Network activity contains more than one unique useragent.
  • Collects information about installed applications
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Generates some ICMP traffic
  • Anomalous binary characteristics

Related domains:

www.360.cn
icanhazip.com

How to determine Strictor.264540?


File Info:

crc32: 129A95C0
md5: bfb6fc3718bf7c3fb28f44e5ac2be840
name: BFB6FC3718BF7C3FB28F44E5AC2BE840.mlw
sha1: 6268cabecde30ab195dcb40974fd150bc5c37fbf
sha256: 946f8daa5429f70d554011682a7f07a9fac8c3b3e32920ba6124743b9992d7c3
sha512: f80652b82ae1d60cfc76c08d47c664c8522d7bbe40a518e34a51dd0f75d1a11566baec4d4648f3d142078d28fb9a69be936bfa873528df97c729eec5cd8627d4
ssdeep: 3072:n8C+Uc6bW9710z7Z+l7irknuMduy82iRW7h7irenTdu6Yn7lJZ378F6D7uQOvjX:OKQoGJpUQgJfvKsMCR3FBr+s6
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: x7248x6743x6240x6709 (C) 2018
InternalName: RunResDll
FileVersion: 1, 0, 0, 1
CompanyName:
LegalTrademarks:
ProductName: RunResDll x5e94x7528x7a0bx5e8f
ProductVersion: 1, 0, 0, 1
FileDescription: RunResDll Microsoft x57fax7840x7c7bx5e94x7528x7a0bx5e8f
OriginalFilename: RunResDll.EXE
Translation: 0x0804 0x04b0

Strictor.264540 also known as:

BkavW32.AIDetect.malware2
K7AntiVirusTrojan ( 0054e0a31 )
Elasticmalicious (high confidence)
DrWebTrojan.PWS.Siggen2.3725
CynetMalicious (score: 100)
ALYacGen:Variant.Strictor.264540
CylanceUnsafe
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (D)
K7GWTrojan ( 0054e0a31 )
Cybereasonmalicious.718bf7
CyrenW32/Zusy.CW.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.GHFL
APEXMalicious
AvastWin32:Trojan-gen
KasperskyTrojan.Win32.Agent.qwidcl
BitDefenderGen:Variant.Strictor.264540
MicroWorld-eScanGen:Variant.Strictor.264540
TencentMalware.Win32.Gencirc.10b1fe67
Ad-AwareGen:Variant.Strictor.264540
SophosML/PE-A
ComodoWorm.Win32.Prux.A@4q442u
BitDefenderThetaGen:NN.ZexaF.34236.yq0@aeatDvbb
McAfee-GW-EditionTrojan-FPZA!BFB6FC3718BF
FireEyeGeneric.mg.bfb6fc3718bf7c3f
EmsisoftGen:Variant.Strictor.264540 (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Agent.bwin
AviraHEUR/AGEN.1111322
eGambitUnsafe.AI_Score_100%
Antiy-AVLTrojan/Generic.ASMalwS.26900A4
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
ArcabitTrojan.Strictor.D4095C
GDataGen:Variant.Strictor.264540
TACHYONTrojan/W32.Agent.393216.AQA
AhnLab-V3Trojan/Win.Generic.R419093
Acronissuspicious
McAfeeTrojan-FPZA!BFB6FC3718BF
MAXmalware (ai score=84)
VBA32Trojan.Fuerboos
MalwarebytesTrojan.Crypt
PandaTrj/GdSda.A
RisingTrojan.Generic@ML.90 (RDML:Azrldlgy2GcQGBv9DFgGrA)
YandexTrojan.GenAsa!wOfcMPeEaoo
IkarusTrojan.Crypt
FortinetW32/Kryptik.GHFL!tr
AVGWin32:Trojan-gen

How to remove Strictor.264540?

Strictor.264540 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment