Trojan

Trojan.Win32.Ekstak.alwcy removal guide

Malware Removal

The Trojan.Win32.Ekstak.alwcy is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Ekstak.alwcy virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities to create a scheduled task
  • CAPE detected the embedded win api malware family
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Trojan.Win32.Ekstak.alwcy?


File Info:

name: 2A521B4059F411489430.mlw
path: /opt/CAPEv2/storage/binaries/2c1cf0d6220a749afab40746965dca29f03da7b268c1a2ace29dbd986112a39c
crc32: 7B72A468
md5: 2a521b4059f411489430b2f6c09e566c
sha1: c6e167faa6d1ce89e9b1690462ecdf7f4fa88435
sha256: 2c1cf0d6220a749afab40746965dca29f03da7b268c1a2ace29dbd986112a39c
sha512: f228405c563454e00a2f691d1dbc1f24bb9574c4297c2e558b0ff78258574e96b3c59629d0b5889246db788b6e3999b4477d730991a3a2efca3d1ab1c01dce84
ssdeep: 196608:fkWwSOiO8wPcB21MYBjSt2PRwQe4fDEOX+ioo0:XnOiO8oTOaRwg9oz
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T122B6339B279EC5D2D0404679FD12B680154AEE533EC4D8C0E5AC7E3DFAF21EAB886413
sha3_384: d40e43afa45ec2fd20a8f41b8d79bfd3d4e1236c62832c6eb160948544d0058c02436e85bceb8591fb791c7cd6dd2bd9
ep_bytes: 558bec83c4cc53565733c08945f08945
timestamp: 1992-06-19 22:22:17

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName: LLD "DevSys Labt"
FileDescription: RecoveryAD for Ext2/3/4 Setup
FileVersion:
LegalCopyright:
Translation: 0x0409 0x04e4

Trojan.Win32.Ekstak.alwcy also known as:

LionicTrojan.Win32.Ekstak.4!c
DrWebTrojan.Siggen17.49970
MicroWorld-eScanAdware.GenericKD.50276830
FireEyeAdware.GenericKD.50276830
SkyhighBehavesLike.Win32.ObfuscatedPoly.vc
McAfeeArtemis!2A521B4059F4
MalwarebytesAdware.DownloadAssistant
K7AntiVirusTrojan ( 005722fe1 )
AlibabaTrojanDropper:Win32/Ekstak.07306c42
K7GWTrojan ( 005722fe1 )
ArcabitAdware.Generic.D2FF29DE
SymantecTrojan.Gen.MBT
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/TrojanDropper.Agent.SLC
APEXMalicious
CynetMalicious (score: 100)
KasperskyTrojan.Win32.Ekstak.alwcy
BitDefenderAdware.GenericKD.50276830
NANO-AntivirusTrojan.Win32.Ekstak.jpblkg
AvastNSIS:Adware-AEK [Adw]
EmsisoftAdware.GenericKD.50276830 (B)
F-SecureHeuristic.HEUR/AGEN.1332256
VIPREAdware.GenericKD.50276830
SophosMal/Generic-S (PUA)
JiangminTrojan.Ekstak.bwcd
WebrootW32.Trojan.Gen
AviraHEUR/AGEN.1332256
MicrosoftTrojan:Win32/Wacatac.B!ml
ZoneAlarmTrojan.Win32.Ekstak.alwcy
GDataAdware.GenericKD.50276830
VaristW32/DownloadAssist.BM.gen!Eldorado
AhnLab-V3Adware/Win.AdwareX-gen.R485547
ALYacAdware.GenericKD.50276830
MAXmalware (ai score=62)
Cylanceunsafe
TencentWin32.Trojan.Ekstak.Twhl
YandexTrojan.Ekstak!C2GrASpo/oE
IkarusTrojan-Dropper.Win32.Agent
FortinetRiskware/Agent
AVGNSIS:Adware-AEK [Adw]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_70% (D)

How to remove Trojan.Win32.Ekstak.alwcy?

Trojan.Win32.Ekstak.alwcy removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment