Malware

Strictor.266655 malicious file

Malware Removal

The Strictor.266655 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Strictor.266655 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Scheduled file move on reboot detected
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Enumerates running processes
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Steals private information from local Internet browsers
  • Likely virus infection of existing system binary

How to determine Strictor.266655?


File Info:

name: 88ED88A7158C62518CF2.mlw
path: /opt/CAPEv2/storage/binaries/45df0d3fe56f331a0eb88c80ca8d3e4c5d6f65d08bcfed318e8f0efc0f9d290c
crc32: A95D19B8
md5: 88ed88a7158c62518cf28615db0f54da
sha1: 4f681efa22b52491e1610021090e698c2c0dceb0
sha256: 45df0d3fe56f331a0eb88c80ca8d3e4c5d6f65d08bcfed318e8f0efc0f9d290c
sha512: 00d3b4818636f6a69581207e210161df0ed842d0d370d242f48246898209f9f7a5c8ca11cb89b37d43d05ac7250989510406867eddfcede77490ec6ea3f3c313
ssdeep: 24576:llAbnkLVsZvtYNNhXHXZKiLIzvKikhidcEmb+318OkZ67pxEEIJJv+viwW2Riak4:lYkKYNNx3OHkJKtkZ6VsJgXW2qocWAr
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T16095F1283732C07AD89017B5CD6D9BF2163D3F71F234D64363B87D867A31A82A527296
sha3_384: a56ea592b49712450ce7057d1acccbe783ebc10a8b982939a275590a08f85379c66742fb7698f2354c4a1e0badacd3c5
ep_bytes: 558bec6aff6828ac570068a087570064
timestamp: 2021-12-01 23:15:17

Version Info:

0: [No Data]

Strictor.266655 also known as:

BkavW32.AIDetect.malware2
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Strictor.266655
McAfeeArtemis!88ED88A7158C
CylanceUnsafe
K7AntiVirusTrojan ( 005606fb1 )
AlibabaTrojan:Win32/Injuke.87e2769a
K7GWHacktool ( 700007861 )
CyrenW32/FakeAlert.FY.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.HBAI
APEXMalicious
Paloaltogeneric.ml
KasperskyHEUR:Trojan.Win32.Injuke.gen
BitDefenderGen:Variant.Strictor.266655
AvastWin32:CrypterX-gen [Trj]
TencentWin32.Trojan.Injuke.Edyb
Ad-AwareGen:Variant.Strictor.266655
SophosMal/Generic-S
DrWebTrojan.Siggen15.63162
TrendMicroTROJ_GEN.R002C0WL521
McAfee-GW-EditionBehavesLike.Win32.Generic.tc
FireEyeGeneric.mg.88ed88a7158c6251
EmsisoftGen:Variant.Strictor.266655 (B)
SentinelOneStatic AI – Malicious PE
AviraHEUR/AGEN.1143574
GridinsoftRansom.Win32.Sabsik.sa
MicrosoftTrojan:Win32/Tiggre!rfn
GDataWin32.Trojan.PSE.1QRPSAL
CynetMalicious (score: 100)
BitDefenderThetaGen:NN.ZexaF.34062.ZDW@aCzGnEwi
ALYacGen:Variant.Strictor.266655
MAXmalware (ai score=89)
TrendMicro-HouseCallTROJ_GEN.R002C0WL521
RisingTrojan.Kryptik!1.AA55 (CLASSIC)
IkarusTrojan.Win32.Crypt
eGambitUnsafe.AI_Score_88%
FortinetW32/Kryptik.HATU!tr
AVGWin32:CrypterX-gen [Trj]
PandaTrj/GdSda.A
CrowdStrikewin/malicious_confidence_60% (W)
MaxSecureTrojan.Malware.300983.susgen

How to remove Strictor.266655?

Strictor.266655 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment