Ransom Trojan

Trojan.Ransom.VegaLocker removal tips

Malware Removal

The Trojan.Ransom.VegaLocker is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Ransom.VegaLocker virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (4 unique times)
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Drops a binary and executes it
  • Performs some HTTP requests
  • Executed a very long command line or script command which may be indicative of chained commands or obfuscation
  • Uses Windows utilities for basic functionality
  • Attempts to delete volume shadow copies
  • Modifies boot configuration settings
  • Installs itself for autorun at Windows startup
  • Clears Windows events or logs
  • Creates a copy of itself
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

Related domains:

iplogger.ru
iplogger.org
apps.identrust.com
isrg.trustid.ocsp.identrust.com
ocsp.int-x3.letsencrypt.org

How to determine Trojan.Ransom.VegaLocker?


File Info:

crc32: 86765CFA
md5: 824c20b4ba06bd9ec5ed999cb7525b36
name: b.exe
sha1: c6e2707673294e7000d389405db0718c7c5a980c
sha256: 24d70038e548e6e1322e5922587d803f181a5a0d8ba95a1a264caa93ccc664a7
sha512: b523b224946e482411de1e34efc8cd40ee831b4c7c27bcbe3670fcb98b7ae9871d494bb4f4fe441c277ab846539a2d258be8967eb7c3e943eb25231c426cd82b
ssdeep: 3072:m87zzhhyoKQMl92cyrrabaDo8RKQELAW0NHMG/CifYNk1G84ot2fm/6X0Sk2LF:m8/zhQadRb1Ht0ot4YYX
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Trojan.Ransom.VegaLocker also known as:

DrWebTrojan.Encoder.28645
MicroWorld-eScanTrojan.GenericKD.41404348
FireEyeGeneric.mg.824c20b4ba06bd9e
Qihoo-360HEUR/QVM19.1.27DB.Malware.Gen
McAfeeRDN/Generic.fap
VIPRETrojan.Win32.Generic!BT
SangforMalware
K7AntiVirusTrojan ( 005511e81 )
BitDefenderTrojan.GenericKD.41404348
K7GWTrojan ( 005511e81 )
CrowdStrikewin/malicious_confidence_100% (W)
TrendMicroTrojan.Win32.WACATAC.USXVPFS19
BitDefenderThetaGen:NN.ZexaF.33558.ruW@aCtj8waG
CyrenW32/Trojan.YLYU-0129
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastWin32:Malware-gen
GDataTrojan.GenericKD.41404348
KasperskyTrojan-Ransom.Win32.Encoder.cya
AlibabaRansom:Win32/Encoder.4a4e8bc5
NANO-AntivirusTrojan.Win32.Encoder.frygji
AegisLabTrojan.Win32.Malicious.4!c
RisingTrojan.Generic@ML.85 (RDMK:eF1I3uGNKdK4lA47GWVw9g)
Ad-AwareTrojan.GenericKD.41404348
EmsisoftTrojan.GenericKD.41404348 (B)
ComodoMalware@#2ni2mokcmo0uh
F-SecureTrojan.TR/AD.ZardRansom.uumrf
ZillyaTrojan.Encoder.Win32.941
Invinceaheuristic
McAfee-GW-EditionBehavesLike.Win32.Pate.dm
SophosMal/Generic-S
IkarusTrojan.Win32.Krypt
WebrootW32.Trojan.Emotet
AviraTR/AD.ZardRansom.uumrf
Endgamemalicious (high confidence)
ArcabitTrojan.Generic.D277C7BC
ZoneAlarmTrojan-Ransom.Win32.Encoder.cya
MicrosoftTrojan:Win32/Occamy.C
AhnLab-V3Malware/Win32.Generic.C3314923
VBA32BScope.Trojan.Wacatac
ALYacTrojan.Ransom.VegaLocker
PandaTrj/CI.A
ESET-NOD32a variant of Win32/Kryptik.GUHU
TrendMicro-HouseCallTrojan.Win32.WACATAC.USXVPFS19
SentinelOneDFI – Malicious PE
AVGWin32:Malware-gen
Cybereasonmalicious.673294
Paloaltogeneric.ml
MaxSecureVirus.Patched.OF

How to remove Trojan.Ransom.VegaLocker?

Trojan.Ransom.VegaLocker removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment