Trojan

What is “Trojan.Win32.Cryprar.acr”?

Malware Removal

The Trojan.Win32.Cryprar.acr is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Cryprar.acr virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • NtSetInformationThread: attempt to hide thread from debugger
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • HTTPS urls from behavior.
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • A scripting utility was executed
  • Uses Windows utilities for basic functionality
  • Uses Windows utilities for basic functionality
  • Behavioural detection: Injection (Process Hollowing)
  • Executed a process and injected code into it, probably while unpacking
  • Behavioural detection: Injection (inter-process)
  • Checks for the presence of known windows from debuggers and forensic tools
  • Created a process from a suspicious location
  • CAPE detected the OnlyLogger malware family
  • Checks for the presence of known devices from debuggers and forensic tools
  • Checks the version of Bios, possibly for anti-virtualization
  • Detects VirtualBox through the presence of a device
  • Detects VirtualBox through the presence of a registry key
  • Attempts to disable Windows Defender
  • Attempts to modify Windows Defender using PowerShell
  • Attempts to execute suspicious powershell command arguments

How to determine Trojan.Win32.Cryprar.acr?


File Info:

name: D4652B92CE361DB1AD75.mlw
path: /opt/CAPEv2/storage/binaries/5358cd172314b25836ff1e01c72e5771a1784712aec7fd713c23ba11d1be1f30
crc32: 9B3801D8
md5: d4652b92ce361db1ad75d7bb8b36d0e6
sha1: 3887f19cb481d2070187af21415d1a3c33976aab
sha256: 5358cd172314b25836ff1e01c72e5771a1784712aec7fd713c23ba11d1be1f30
sha512: 74cb048f8f7b8b6e3c0119c1870518a9590b931f46a4fe2bda7473f49d757f9073753a93dd3e9aa0e88ec68086d8027975ba47f89f562da8c8333bc72fe327a0
ssdeep: 393216:xKdgEFwRc6uFCfPP+T0Vj4ejK/5aNClnvIx/qeg:sdgEFKcEfPWIV0ejK/hV+g
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T175F633CA6D08C0B9DE1BD0B96788F9F29AF6409582A64CEB974D40C813F4445FDDF6E2
sha3_384: 20f77bc93e7bbd943b8eb43ee4cd42ceb6d1f50837e1b25d48e7024f21710ade58ca217d481b59e7c542e29cb310ca1f
ep_bytes: 558bec6aff6898c24100680691410064
timestamp: 2019-02-21 16:00:00

Version Info:

CompanyName: Igor Pavlov
FileDescription: 7z Setup SFX
FileVersion: 19.00
InternalName: 7zS.sfx
LegalCopyright: Copyright (c) 1999-2018 Igor Pavlov
OriginalFilename: 7zS.sfx.exe
ProductName: 7-Zip
ProductVersion: 19.00
Translation: 0x0409 0x04b0

Trojan.Win32.Cryprar.acr also known as:

MicroWorld-eScanGen:Variant.Jaik.45703
FireEyeGen:Variant.Jaik.45703
CAT-QuickHealPUA.GenericPMF.S24746672
CylanceUnsafe
K7AntiVirusTrojan-Downloader ( 0058b4731 )
K7GWTrojan-Downloader ( 0058b4731 )
Cybereasonmalicious.2ce361
CyrenW32/Agent.DSN.gen!Eldorado
ESET-NOD32multiple detections
ClamAVWin.Packed.Barys-9859531-0
KasperskyTrojan.Win32.Cryprar.acr
BitDefenderGen:Variant.Jaik.45703
NANO-AntivirusTrojan.Win32.Steam.jiqpte
AvastWin32:TrojanX-gen [Trj]
RisingBackdoor.Mokes!1.CECE (CLASSIC:cmRtazpyPDvIKtEiNivBVDm8gGPz)
Ad-AwareGen:Variant.Jaik.45703
EmsisoftGen:Variant.Jaik.45703 (B)
DrWebTrojan.PWS.Stealer.31749
TrendMicroTROJ_GEN.R002C0PL421
McAfee-GW-EditionDownloader-FCFI!69F7B12DE726
SophosMal/Generic-S
GDataGen:Variant.Jaik.45703
JiangminPSWTool.NetPass.abp
eGambitUnsafe.AI_Score_99%
AviraTR/Dldr.Agent.jwsnf
Antiy-AVLTrojan/Generic.ASMalwS.34E5139
KingsoftWin32.Troj.Stealer.an.(kcloud)
ArcabitTrojan.Jaik.DB287
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
CynetMalicious (score: 99)
BitDefenderThetaGen:NN.ZedlaF.34062.n88baOE@FOp
ALYacGen:Variant.Jaik.45703
MAXmalware (ai score=81)
VBA32Trojan.Zapchast
MalwarebytesTrojan.Dropper.SFX.Generic
TrendMicro-HouseCallTROJ_GEN.R002H0CL621
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/BSE.4Q7Q!tr
AVGWin32:TrojanX-gen [Trj]

How to remove Trojan.Win32.Cryprar.acr?

Trojan.Win32.Cryprar.acr removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment