Ransom Trojan

About “Trojan.Ransom.Loki.FHU” infection

Malware Removal

The Trojan.Ransom.Loki.FHU is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Ransom.Loki.FHU virus can do?

  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid

How to determine Trojan.Ransom.Loki.FHU?


File Info:

name: 275D86C7F8628B7A734E.mlw
path: /opt/CAPEv2/storage/binaries/16fd6ed18c8544638817dccb48e83c790e362d96e7ad30a7689d540d61165e96
crc32: 18022254
md5: 275d86c7f8628b7a734e7f34ab88ca34
sha1: de82df51ac0ec5d728f15e98f00955bc2a8adcad
sha256: 16fd6ed18c8544638817dccb48e83c790e362d96e7ad30a7689d540d61165e96
sha512: f4463387f79c02abd5e29d8d18469c1f8b85bea736991025687f4a3796af668ae8454ad734103d2d21ba28065358db46e59e981fc92e2e9f636eccf99da3b572
ssdeep: 12288:Eg6SKlpxZtOwjk3rGa8RsMPs/U6ZK8P4gWb5RL0KTeiy:mLlpx/hUpMsgsc6ZK2zWb5F0t
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T106E41281B25B8A03E53E0FBBF0A221191B7492BEA912F1490AD97CF35D757134BA5F07
sha3_384: 9fcd2dc997210e7f7cb8af5cc0d875b4ee082ce16abd2e16ca04357ab2f758f552eaa2d4afed974767c65047c86988e1
ep_bytes: ff250020400000000000000000000000
timestamp: 2022-08-01 02:31:26

Version Info:

Translation: 0x0000 0x04b0
Comments:
CompanyName: Builders Emporium
FileDescription: Kruskal
FileVersion: 1.0.0.1
InternalName: IEvidenceFact.exe
LegalCopyright: Builders Emporium 2022 (C)
LegalTrademarks:
OriginalFilename: IEvidenceFact.exe
ProductName: Kruskal
ProductVersion: 1.0.0.1
Assembly Version: 1.0.0.0

Trojan.Ransom.Loki.FHU also known as:

BkavW32.AIDetectMalware.CS
AVGWin32:PWSX-gen [Trj]
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.Ransom.Loki.FHU
FireEyeGeneric.mg.275d86c7f8628b7a
CAT-QuickHealTrojan.YakbeexMSIL.ZZ4
SkyhighBehavesLike.Win32.Generic.jc
McAfeeAgentTesla-FDAV!275D86C7F862
MalwarebytesGeneric.Malware.AI.DDS
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 005965f11 )
AlibabaTrojan:Win32/Kryptik.ali2000016
K7GWTrojan ( 005965f11 )
CrowdStrikewin/malicious_confidence_100% (W)
BitDefenderThetaGen:NN.ZemsilF.36802.Pm0@aiNX84g
VirITTrojan.Win32.MSIL_Heur.A
SymantecScr.Malcode!gdn30
tehtrisGeneric.Malware
ESET-NOD32a variant of MSIL/Kryptik.AFXY
APEXMalicious
ClamAVWin.Packed.Nanocore-10023109-0
KasperskyHEUR:Trojan.MSIL.Crypt.gen
BitDefenderTrojan.Ransom.Loki.FHU
AvastWin32:PWSX-gen [Trj]
TencentMalware.Win32.Gencirc.13b5c881
EmsisoftTrojan.Ransom.Loki.FHU (B)
F-SecureTrojan.TR/Dropper.MSIL.Gen
DrWebTrojan.Inject4.39103
VIPRETrojan.Ransom.Loki.FHU
Trapminesuspicious.low.ml.score
SophosTroj/Steal-CWC
SentinelOneStatic AI – Malicious PE
VaristW32/MSIL_Kryptik.HUC.gen!Eldorado
AviraTR/Dropper.MSIL.Gen
MAXmalware (ai score=84)
Antiy-AVLTrojan/MSIL.Kryptik
MicrosoftTrojan:MSIL/AgentTesla.EH!MTB
ArcabitTrojan.Ransom.Loki.FHU
ZoneAlarmHEUR:Trojan.MSIL.Crypt.gen
GDataMSIL.Trojan.PSE.15LGMUI
GoogleDetected
AhnLab-V3Trojan/Win.TrojanX-gen.C5217545
VBA32OScope.Trojan.MSIL.Remcos.gen
ALYacTrojan.Ransom.Loki.FHU
Cylanceunsafe
PandaTrj/GdSda.A
RisingMalware.Obfus/MSIL@AI.100 (RDM.MSIL2:PDETEwjeVm043O7kBD896A)
IkarusTrojan.Inject
MaxSecureTrojan.Malware.300983.susgen
FortinetMSIL/Kryptik.AGQB!tr
DeepInstinctMALICIOUS

How to remove Trojan.Ransom.Loki.FHU?

Trojan.Ransom.Loki.FHU removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment