Malware

How to remove “Symmi.88851 (B)”?

Malware Removal

The Symmi.88851 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Symmi.88851 (B) virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Uses Windows utilities for basic functionality
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Uses Windows utilities to create a scheduled task
  • Deletes executed files from disk
  • Uses suspicious command line tools or Windows utilities
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Symmi.88851 (B)?


File Info:

name: 6DCB64708BFA4ABEB9C1.mlw
path: /opt/CAPEv2/storage/binaries/974147edaf9683f8a336c157692237754956f57b42f93f847c83ab7c9afafe2a
crc32: 3B37720B
md5: 6dcb64708bfa4abeb9c1e967db35a774
sha1: bcc58724ea2b85a30fb2e3a5688ddc78fbcb4576
sha256: 974147edaf9683f8a336c157692237754956f57b42f93f847c83ab7c9afafe2a
sha512: 1de16d5cd965900933034126d1b7c09f1bcedea5c518a580aa89a18a440bffd65d9ea825223aa5965bced36366929e0cc126b1d68b3f60d0affa296982a2a98c
ssdeep: 24576:XG4U8DyrFnjQKI8GQdz1B+5vMiqt0gj2eGuTyR7NNh10eYlaahkk3SSxhABlEw:XGD9dI8Fd7qO0uTyR7NNh10h42kk3bx2
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T15145F1677BC41771E64106B5366FD8E2F71E54B9336AE6F068E9806C11A2E2883377CC
sha3_384: 82fdceb7d60bf6fdc06504ce9c5a099b87ea526b4721562ef241e7a8417fcc800a5c98fd5f7b1157e7df65b02c0ec840
ep_bytes: 6800000000585709f6be4427b7d75b01
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Symmi.88851 (B) also known as:

Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Symmi.88851
FireEyeGeneric.mg.6dcb64708bfa4abe
SkyhighBehavesLike.Win32.Generic.tc
McAfeeGlupteba-FTTQ!6DCB64708BFA
MalwarebytesGeneric.Malware.AI.DDS
ZillyaTrojan.Generic.Win32.1429181
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 0058e60a1 )
BitDefenderGen:Variant.Symmi.88851
K7GWTrojan ( 0058e60a1 )
CrowdStrikewin/malicious_confidence_100% (D)
BitDefenderThetaGen:NN.ZexaF.36792.lzZ@aKUkY
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.HTKQ
APEXMalicious
ClamAVWin.Packed.Wacatac-9869472-0
KasperskyHEUR:Trojan.Win32.Generic
NANO-AntivirusVirus.Win32.Gen.ccmw
RisingTrojan.Kryptik!1.D284 (CLASSIC)
SophosML/PE-A
F-SecureTrojan.TR/Dropper.Gen
VIPREGen:Variant.Symmi.88851
Trapminemalicious.moderate.ml.score
EmsisoftGen:Variant.Symmi.88851 (B)
IkarusTrojan.Win32.Krypt
GoogleDetected
AviraTR/Dropper.Gen
VaristW32/Khalesi.J.gen!Eldorado
Antiy-AVLTrojan/Win32.Kryptik
Kingsoftmalware.kb.a.999
MicrosoftTrojan:Win32/Wacatac.B!ml
ArcabitTrojan.Symmi.D15B13
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataGen:Variant.Symmi.88851
CynetMalicious (score: 100)
VBA32BScope.Trojan.Wacatac
ALYacGen:Variant.Symmi.88851
MAXmalware (ai score=89)
DeepInstinctMALICIOUS
Cylanceunsafe
TencentTrojan.Win32.Kryptik.fh
YandexTrojan.Agent!aAOwXbfTj1Q
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.T!tr
AVGWin32:TrojanX-gen [Trj]
Cybereasonmalicious.4ea2b8
AvastWin32:TrojanX-gen [Trj]

How to remove Symmi.88851 (B)?

Symmi.88851 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment