Trojan

How to remove “Trojan-Downloader.Win32.PirateMatryoshka.ake”?

Malware Removal

The Trojan-Downloader.Win32.PirateMatryoshka.ake is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Downloader.Win32.PirateMatryoshka.ake virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • Authenticode signature is invalid
  • Created a process from a suspicious location
  • Attempts to modify proxy settings
  • Harvests cookies for information gathering
  • Anomalous binary characteristics

How to determine Trojan-Downloader.Win32.PirateMatryoshka.ake?


File Info:

name: C10B1331A619BE99B7F1.mlw
path: /opt/CAPEv2/storage/binaries/11addc6b220eeac465f2aad99de1fbc12f4726095dad347d3e65646d3c1d0a92
crc32: 093D6C1E
md5: c10b1331a619be99b7f1fd1609864181
sha1: 417a5240a53aa3005fcd1e237762ae805add9094
sha256: 11addc6b220eeac465f2aad99de1fbc12f4726095dad347d3e65646d3c1d0a92
sha512: 931fd16e33d73a8dc25bb016c8098434d1f094a56f1b4752c30d8e076a6b01058d7124d51057b464521638f8e8aebf02c890aa01ce7f79355c9d7df046611a5f
ssdeep: 24576:9QFYGY9+9d/G7P9lkQ/exnzGn4dLsUvqkaT+0BpCCh+PDedNdUhZuIBWc3A3:hN26FOnzGn6LJvqkwnpC+mWd6uIcc3G
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1EB851242F782D0B1D8A900B505668BB64F757D3257BAC4F36FD07D6E8E703D0AA3264A
sha3_384: 71a9191a0506d4e82a9df3506b4d9e267670b747658db6afb6625073cd4ad2f11449817ad146e73bab4cb955b8a3654d
ep_bytes: e8a61d0000e989feffff8bff565733f6
timestamp: 2012-06-14 16:16:10

Version Info:

Comments: Created with Setup Factory
FileDescription: Setup Application
FileVersion: 9.1.0.0
InternalName: suf_launch
LegalCopyright: Setup Engine Copyright © 2004-2012 Indigo Rose Corporation
LegalTrademarks: Setup Factory is a trademark of Indigo Rose Corporation.
OriginalFilename: suf_launch.exe
ProductName: Setup Factory Runtime
ProductVersion: 9.1.0.0
Translation: 0x0409 0x04e4

Trojan-Downloader.Win32.PirateMatryoshka.ake also known as:

LionicTrojan.Win32.PirateMatryoshka.a!c
Elasticmalicious (high confidence)
McAfeeArtemis!C10B1331A619
CylanceUnsafe
SangforTrojan.Win32.PirateMatryoshka.ake
K7AntiVirusRiskware ( 00584baa1 )
AlibabaTrojanDownloader:Win32/PirateMatryoshka.fe96b8cb
K7GWRiskware ( 00584baa1 )
CrowdStrikewin/malicious_confidence_60% (W)
APEXMalicious
Paloaltogeneric.ml
KasperskyTrojan-Downloader.Win32.PirateMatryoshka.ake
SUPERAntiSpywareTrojan.Agent/Gen-DownloaderPirateMatryoshka
AvastWin32:Malware-gen
TencentWin32.Trojan-downloader.Piratematryoshka.Sttr
SophosGeneric ML PUA (PUA)
DrWebTrojan.DownLoader28.14211
McAfee-GW-EditionBehavesLike.Win32.Dropper.tc
WebrootW32.Malware.Gen
AviraTR/Dldr.PirateMatryoshka.gwmgq
MicrosoftTrojan:Win32/Wacatac.B!ml
CynetMalicious (score: 99)
AhnLab-V3Malware/Win32.Generic.C3265625
VBA32Adware.Presenoker
TrendMicro-HouseCallTROJ_GEN.R002H0CFF22
RisingDownloader.PirateMatryoshka!8.10904 (CLOUD)
SentinelOneStatic AI – Suspicious PE
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/Indiloadz.CA!tr
AVGWin32:Malware-gen

How to remove Trojan-Downloader.Win32.PirateMatryoshka.ake?

Trojan-Downloader.Win32.PirateMatryoshka.ake removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment