Ransom Trojan

Trojan.RansomKD.6246363 information

Malware Removal

The Trojan.RansomKD.6246363 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.RansomKD.6246363 virus can do?

  • Executable code extraction
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • Expresses interest in specific running processes
  • Reads data out of its own binary image
  • A process created a hidden window
  • Creates an excessive number of UDP connection attempts to external IP addresses
  • Uses Windows utilities for basic functionality
  • Attempts to delete volume shadow copies
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Exhibits behavior characteristic of Cerber ransomware
  • EternalBlue behavior
  • Generates some ICMP traffic
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

How to determine Trojan.RansomKD.6246363?


File Info:

crc32: B1FEC6B7
md5: a63e6549a6535904b3f97ded3501fa23
name: A63E6549A6535904B3F97DED3501FA23.mlw
sha1: 7d2bee34d2a58af4731bf51461ea4875f701c41d
sha256: 15d16d62e9308f628a23123aa5b65b6cbd95420009e5b757024d28b264d86da8
sha512: f7232f8106d2c1582fd485450079dc0614c3de9b78ad12cb8c9959124c544f0325f097dc7ef35501c20409836e6569aa0a3b2ceeca20ba6050dd8f934d294dbf
ssdeep: 6144:bB+pgUpE3apqm9EuCtgn2QSYRX8AV1wT+XuhCJgdYtbS+f2awE1SY5hcGcQlXxSF:bgBSaEmWc2esAV1vuoPbS+9j/YQlhSF
type: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive

Version Info:

LegalCopyright: Copyright (c) Insecure.Com LLC (fyodor@insecure.org)
InternalName: NmapInstaller.exe
FileVersion: 5.36.0.4
CompanyName: Insecure.org
ProductName: Nmap
FileDescription: Nmap installer
LegalTrademark: NMAP
Translation: 0x0409 0x04b0

Trojan.RansomKD.6246363 also known as:

BkavW32.AIDetect.malware2
K7AntiVirusTrojan ( 0055e3ef1 )
LionicTrojan.Win32.Generic.4!c
Elasticmalicious (high confidence)
DrWebTrojan.Encoder.4691
CynetMalicious (score: 99)
ALYacTrojan.RansomKD.6246363
CylanceUnsafe
SangforTrojan.Win32.Generic.8
CrowdStrikewin/malicious_confidence_100% (W)
K7GWTrojan ( 0055e3ef1 )
Cybereasonmalicious.9a6535
SymantecPacked.NSISPacker!g3
ESET-NOD32NSIS/Injector.IK
APEXMalicious
AvastWin32:Trojan-gen
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderTrojan.RansomKD.6246363
NANO-AntivirusTrojan.Nsis.Inject.eikrhe
MicroWorld-eScanTrojan.RansomKD.6246363
TencentWin32.Trojan.Ransomkd.Lkxi
Ad-AwareTrojan.RansomKD.6246363
ComodoMalware@#3ee38rijn3x3p
VIPRETrojan.Win32.Generic!BT
TrendMicroRansom_NSISRansom.SM001
McAfee-GW-EditionBehavesLike.Win32.Dropper.gc
FireEyeGeneric.mg.a63e6549a6535904
EmsisoftTrojan.RansomKD.6246363 (B)
SentinelOneStatic AI – Suspicious PE
AviraTR/Dropper.Gen
MicrosoftRansom:Win32/Cerber.F
SUPERAntiSpywareRansom.Cerber/Variant
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataTrojan.RansomKD.6246363
TACHYONTrojan/W32.Inject.471600
AhnLab-V3Trojan/Win32.Locky.C1637076
McAfeeArtemis!A63E6549A653
MAXmalware (ai score=100)
MalwarebytesRansom.Cerber
PandaTrj/Cerber.A
TrendMicro-HouseCallRansom_NSISRansom.SM001
FortinetW32/Injector.IK!tr
AVGWin32:Trojan-gen
Paloaltogeneric.ml

How to remove Trojan.RansomKD.6246363?

Trojan.RansomKD.6246363 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment