Malware

Symmi.62677 (file analysis)

Malware Removal

The Symmi.62677 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Symmi.62677 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • CAPE detected the Kutaki malware family
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Symmi.62677?


File Info:

name: D6BD299A5DA0133C8786.mlw
path: /opt/CAPEv2/storage/binaries/7b3efd4941f852bc89fdcd35e17add41798b2de6833f9c328ec48a8285608b70
crc32: 28D9F9CD
md5: d6bd299a5da0133c8786dca9d883b6f4
sha1: cf69a03d2bd6b9b18db0d07747bb2b2650c19eeb
sha256: 7b3efd4941f852bc89fdcd35e17add41798b2de6833f9c328ec48a8285608b70
sha512: 544d15fc63ac746e02a11fe94fa68b17929f2939655fc9d18c252ee49e3fbd3a831b68e4c603447fd9aaec831bcb081e17449e3056cef55ff61911783777af7b
ssdeep: 49152:OikWk5cS7a+9XYaQ6Zehc4mTYJ78V9gyBn4cDfmP/SA8N:1ajJhZ942KQV9hp4+fmP/SA8
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T187B5D1079D458B83D52897F8BE034EAC6F563B0CE9823AFF54225EDB3D206215C5E52E
sha3_384: e99ff37383b70ac4b18b1e0f3da8b1f02b3bf27c71e0b4898eded5f23cf66d48501f1cd51fd4ef591d8797403752e007
ep_bytes: 6840154000e8f0ffffff000000000000
timestamp: 2023-05-28 17:58:31

Version Info:

Translation: 0x0409 0x04b0
CompanyName: SOFTKING CONSULTS
ProductName: Oliver
FileVersion: 1.04.0003
ProductVersion: 1.04.0003
InternalName: 3
OriginalFilename: 3.exe

Symmi.62677 also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.KeyLogger.4!c
MicroWorld-eScanGen:Variant.Symmi.62677
ClamAVWin.Keylogger.Kutaki-9969497-0
FireEyeGeneric.mg.d6bd299a5da0133c
McAfeeArtemis!D6BD299A5DA0
MalwarebytesKeyLogger.Spyware.Stealer.DDS
SangforTrojan.Win32.Save.a
K7AntiVirusSpyware ( 0000d4291 )
AlibabaTrojanSpy:Win32/KeyLogger.f8afdf9e
K7GWSpyware ( 0000d4291 )
Cybereasonmalicious.a5da01
ArcabitTrojan.Symmi.DF4D5
CyrenW32/Keylogger.BD.gen!Eldorado
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Spy.KeyLogger.NJK
APEXMalicious
CynetMalicious (score: 100)
KasperskyTrojan-Spy.Win32.KeyLogger.ckmb
BitDefenderGen:Variant.Symmi.62677
AvastWin32:Kutaki-A [Spy]
TencentMalware.Win32.Gencirc.11a650b4
EmsisoftGen:Variant.Symmi.62677 (B)
F-SecureTrojan.TR/Dropper.Gen
VIPREGen:Variant.Symmi.62677
TrendMicroTROJ_GEN.R002C0WEV23
McAfee-GW-EditionBehavesLike.Win32.Backdoor.vc
Trapminemalicious.high.ml.score
SophosMal/Generic-S
IkarusTrojan-Spy.Agent
AviraTR/Dropper.Gen
Antiy-AVLTrojan[Spy]/Win32.KeyLogger
MicrosoftTrojan:Win32/Sabsik.TE.B!ml
ZoneAlarmTrojan-Spy.Win32.KeyLogger.ckmb
GDataGen:Variant.Symmi.62677
GoogleDetected
BitDefenderThetaGen:NN.ZevbaF.36250.qo0@aSSPyMbi
ALYacGen:Variant.Symmi.62677
MAXmalware (ai score=82)
Cylanceunsafe
PandaTrj/Chgt.AD
TrendMicro-HouseCallTROJ_GEN.R002C0WEV23
RisingStealer.Kutaki!1.D278 (CLASSIC)
YandexTrojanSpy.KeyLogger!YP3oi/m//jg
SentinelOneStatic AI – Suspicious PE
FortinetW32/KeyLogger.ODN!tr
AVGWin32:Kutaki-A [Spy]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Symmi.62677?

Symmi.62677 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment