Ransom Trojan

Trojan.Ransom.GlobeImposter.D malicious file

Malware Removal

The Trojan.Ransom.GlobeImposter.D is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Ransom.GlobeImposter.D virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Creates RWX memory
  • A process created a hidden window
  • Unconventionial language used in binary resources: Catalan
  • The binary likely contains encrypted or compressed data.
  • Executed a process and injected code into it, probably while unpacking
  • Network activity detected but not expressed in API logs
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine Trojan.Ransom.GlobeImposter.D?


File Info:

crc32: A4BDB396
md5: 54088027902cf33e9c8e7a3df952acea
name: 54088027902CF33E9C8E7A3DF952ACEA.mlw
sha1: feff7325ed956f2cbdcd53b398de5bf08f47b38d
sha256: 049c7e9a9003bf8046b5e32a69ccf01069c0323f8af9b2210d69f9b6ccd2809c
sha512: b4af007ff55c64e9c03af24901c46e0c72b2e920ed7c109e7d6f1bdf144c77ad7dfc9a25e2e6c7603879ce439f9f0a7ba4ba02a22b7487dd4d03246a4173c919
ssdeep: 6144:FAOJcll7ZtPUMsboH9zIz/X9dkM1BuWdJ9qjmptpvRN:F7c77PUMsboHeUWdJ9qwHz
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Trojan.Ransom.GlobeImposter.D also known as:

BkavW32.AIDetect.malware1
K7AntiVirusTrojan ( 0051418e1 )
LionicTrojan.Win32.Scarsi.4!c
Elasticmalicious (high confidence)
DrWebTrojan.Rmnet.60
MicroWorld-eScanTrojan.Ransom.GlobeImposter.D
CAT-QuickHealTrojan.MauvaiseRI.S5250020
ALYacTrojan.Ransom.GlobeImposter
CylanceUnsafe
ZillyaTrojan.Scarsi.Win32.3698
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaTrojan:Win32/Kryptik.2ee0c22f
K7GWTrojan ( 0051418e1 )
Cybereasonmalicious.7902cf
CyrenW32/S-f4afc55c!Eldorado
SymantecW32.Futurax
ESET-NOD32a variant of Win32/Kryptik.FVHB
APEXMalicious
AvastWin32:A1Lock-B [Trj]
CynetMalicious (score: 100)
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderTrojan.Ransom.GlobeImposter.D
NANO-AntivirusTrojan.Win32.Inject.erqxgf
TencentMalware.Win32.Gencirc.10baf1ea
Ad-AwareTrojan.Ransom.GlobeImposter.D
SophosMal/Generic-R + Mal/Emotet-E
ComodoMalware@#1ojk4c42ybn2w
BitDefenderThetaAI:Packer.7DA638471E
VIPRETrojan.Win32.Generic!BT
TrendMicroRansom_PEYDAY.A
McAfee-GW-EditionBehavesLike.Win32.Virut.fh
FireEyeGeneric.mg.54088027902cf33e
EmsisoftTrojan.Ransom.GlobeImposter.D (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Generic.bfkwk
WebrootW32.Trojan.Gen
AviraHEUR/AGEN.1126869
eGambitUnsafe.AI_Score_85%
MicrosoftTrojan:Win32/Dynamer!rfn
GDataTrojan.Ransom.GlobeImposter.D
TACHYONTrojan/W32.Scarsi.375296
AhnLab-V3Trojan/Win32.Globeimposter.R206214
Acronissuspicious
McAfeeEmotet-FAX!
MAXmalware (ai score=100)
VBA32BScope.Trojan.Inject
MalwarebytesMachineLearning/Anomalous.100%
PandaTrj/CI.A
TrendMicro-HouseCallRansom_PEYDAY.A
RisingRansom.GlobeImposter!1.AF70 (CLASSIC)
YandexTrojan.GenAsa!aiunZ6hvKdA
IkarusTrojan.Crypt
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Generic.AP.124D28!tr
AVGWin32:A1Lock-B [Trj]
Paloaltogeneric.ml
Qihoo-360Win32/Ransom.GlobeImposter.HwoCw9cA

How to remove Trojan.Ransom.GlobeImposter.D?

Trojan.Ransom.GlobeImposter.D removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment