Malware

Symmi.62789 (file analysis)

Malware Removal

The Symmi.62789 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Symmi.62789 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Created a process from a suspicious location
  • CAPE detected the Kutaki malware family
  • Anomalous binary characteristics

How to determine Symmi.62789?


File Info:

name: 29A444FD62712CDFEA44.mlw
path: /opt/CAPEv2/storage/binaries/8ed0529363d69b1748385178a6e7f894652ab642d314a984ec19599d591fbdb4
crc32: 06AE5101
md5: 29a444fd62712cdfea44c8cb97d7b7e7
sha1: 027a76d7335c0070bbb2b085b6119ec3adf76547
sha256: 8ed0529363d69b1748385178a6e7f894652ab642d314a984ec19599d591fbdb4
sha512: e9ede4fd1044ced991a4c46c77fc70ededf89b25c9918ec76efdc1c6ae90a0194e0fe877b26a7fc60f59f7f275b2b268797ee0cc843c9c65b3b68708c816cb94
ssdeep: 24576:UyM8JTmsOe46D5tKERWpnhNjQlUPnGYI5aDMSfmP/UDMS08Ckn3m:pMsD46lgEshNjQmuYMaoSfmP/SA8NW
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T17C451207FB834A61EC6D6E706FD391D016A3B9AA1B57064FB340722978B0F912C58B4F
sha3_384: 91e02229b9c8429f117d108c55348e19a9bda0f40414d6f40f0e4e00c99d6b325c302a854ec438abfac4e5f9faaefed1
ep_bytes: 688c244000e8f0ffffff000000000000
timestamp: 2022-05-08 11:40:23

Version Info:

Translation: 0x0409 0x04b0
CompanyName: tj
ProductName: Spatial Matrix
FileVersion: 1.01.0004
ProductVersion: 1.01.0004
InternalName: 13
OriginalFilename: 13.exe

Symmi.62789 also known as:

BkavW32.AIDetect.malware2
LionicTrojan.Win32.Bingoml.4!c
Elasticmalicious (high confidence)
CAT-QuickHealTrojan.Keylogger.S25879104
McAfeeGenericRXAA-FA!29A444FD6271
MalwarebytesMalware.AI.11071512
SangforTrojan.Win32.Bingoml.edpa
CrowdStrikewin/malicious_confidence_100% (W)
BitDefenderGen:Variant.Symmi.62789
K7GWNetWorm ( 700000151 )
K7AntiVirusNetWorm ( 700000151 )
CyrenW32/Keylogger.BD.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Spy.KeyLogger.NJK
APEXMalicious
Paloaltogeneric.ml
CynetMalicious (score: 100)
KasperskyTrojan.Win32.Bingoml.edpa
AlibabaTrojanSpy:Win32/KeyLogger.2472fbfd
MicroWorld-eScanGen:Variant.Symmi.62789
AvastWin32:Kutaki-A [Spy]
RisingStealer.Kutaki!1.D278 (CLOUD)
Ad-AwareGen:Variant.Symmi.62789
EmsisoftGen:Variant.Symmi.62789 (B)
TrendMicroTSPY_VBKEYLOG.SM
McAfee-GW-EditionBehavesLike.Win32.Generic.tc
FireEyeGeneric.mg.29a444fd62712cdf
SophosMal/Generic-S
SentinelOneStatic AI – Malicious PE
GDataGen:Variant.Symmi.62789
AviraHEUR/AGEN.1239053
MAXmalware (ai score=81)
KingsoftWin32.Troj.Undef.(kcloud)
ArcabitTrojan.Symmi.DF545
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
ALYacGen:Variant.Symmi.62789
CylanceUnsafe
TrendMicro-HouseCallTSPY_VBKEYLOG.SM
TencentWin32.Trojan.Bingoml.Htcm
IkarusTrojan-Spy.Agent
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/KeyLogger.ODN!tr
AVGWin32:Kutaki-A [Spy]

How to remove Symmi.62789?

Symmi.62789 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment