Malware

Strictor.365 malicious file

Malware Removal

The Strictor.365 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Strictor.365 virus can do?

  • Unconventionial language used in binary resources: Russian
  • The binary contains an unknown PE section name indicative of packing
  • The executable is compressed using UPX
  • Authenticode signature is invalid

How to determine Strictor.365?


File Info:

name: 9E986228556050C13CAA.mlw
path: /opt/CAPEv2/storage/binaries/5e4bb52f4cc88e7949350b2db72743e32b27d233b4921b33d981e499e6110a2f
crc32: BA33BB96
md5: 9e986228556050c13caafe66a3e1d260
sha1: 016bd4d699c4face591c9fcb7586b4cd8e84440f
sha256: 5e4bb52f4cc88e7949350b2db72743e32b27d233b4921b33d981e499e6110a2f
sha512: 395ee206b91ee84143978f74141365b6c9c4c78124295d1a04882f903d0e946f5e682f739fefcb72481f1bc5853a15f82abd8d9c0ccdbdcb4935ba67e071dd67
ssdeep: 3072:XJ64jgeAgkBLvNWeBASyYT/koH22G7qYseZB/AEM:XwO2gGAeBASyoHOQ0/
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T168E3D0047795C522D0AA027028E2D6F70635FC11DAA4C617BBA97F2FFE3664754323AB
sha3_384: db4704c0ffcbd667318a034e37c7d89961b6f02031afa60a7be39ab25cc98ce6d1f185f23e7d545cd8ed7d3e07af0227
ep_bytes: 558bec6aff688c1041006854ea400064
timestamp: 2009-04-05 11:55:52

Version Info:

CompanyName: Nonuo Oo
FileDescription: reecaca. Aieee Enc
FileVersion: 10.2.2800.2500
InternalName: ireeysapi Oziyg. Iygaes
LegalCopyright: irtion © yadoo 1985 - 2011
OriginalFilename: univiianc.exe
ProductName: Spmyppi
ProductVersion: 10.2.2800.2500
Translation: 0x0409 0x04b0

Strictor.365 also known as:

BkavW32.AIDetect.malware2
LionicTrojan.Win32.Generic.ltWd
Elasticmalicious (high confidence)
DrWebTrojan.Packed.22480
MicroWorld-eScanGen:Variant.Strictor.365
FireEyeGeneric.mg.9e986228556050c1
CAT-QuickHealTrojan.Rimecud.U
ALYacGen:Variant.Strictor.365
MalwarebytesMalware.Heuristic.1003
VIPRETrojan.Win32.Rimecud.m (v)
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 004bcce41 )
AlibabaTrojan:Win32/IStartSurf.14a8b77c
K7GWTrojan ( 004bcce41 )
CrowdStrikewin/malicious_confidence_100% (D)
BitDefenderThetaGen:NN.ZexaF.34182.jm0@aararrkk
CyrenW32/A-515d050b!Eldorado
SymantecTrojan.Gen
ESET-NOD32a variant of Win32/Kryptik.EMWA
TrendMicro-HouseCallWORM_REMECUD.SMU
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.Strictor.365
NANO-AntivirusTrojan.Win32.Crypted.bgmioc
SUPERAntiSpywareTrojan.Agent/Gen-Cryptic
AvastFileRepMalware
TencentWin32.Trojan.Agent.cibo
SophosML/PE-A + Mal/Rimecud-R
ComodoPacked.Win32.MUPX.Gen@24tbus
TrendMicroWORM_REMECUD.SMU
McAfee-GW-EditionBehavesLike.Win32.PWSZbot.cm
EmsisoftGen:Variant.Strictor.365 (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan/Generic.zons
MaxSecureVirus.Sality.AA
AviraTR/Crypt.XPACK.Gen
MAXmalware (ai score=100)
KingsoftWin32.Troj.Undef.(kcloud)
MicrosoftPWS:Win32/Zbot!ml
GDataGen:Variant.Strictor.365
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.Agent.C197967
McAfeeW32/Rimecud.gen.dy
VBA32BScope.Worm.Palevo.1141
APEXMalicious
RisingTrojan.Rimecud!8.60A (CLOUD)
YandexTrojan.GenAsa!eLe1u6Qguv0
IkarusTrojan-Downloader.Win32.Cbeplay
eGambitGeneric.Malware
FortinetW32/KRYPTIK.AS!tr
WebrootW32.Malware.Gen
AVGFileRepMalware
Cybereasonmalicious.855605
PandaTrj/Rimecud.f

How to remove Strictor.365?

Strictor.365 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment