Trojan

Trojan.Win32.Ekstak.jesj (file analysis)

Malware Removal

The Trojan.Win32.Ekstak.jesj is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Ekstak.jesj virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Creates RWX memory
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • Queries information on disks, possibly for anti-virtualization
  • Detects the presence of Wine emulator via registry key
  • Checks the version of Bios, possibly for anti-virtualization
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

static.16.249.201.195.clients.your-server.de

How to determine Trojan.Win32.Ekstak.jesj?


File Info:

crc32: 62994A94
md5: 6d9a4c397a54e53d05213f74ce7b43b6
name: 6D9A4C397A54E53D05213F74CE7B43B6.mlw
sha1: 3d75abc2784824b167d9b7378acc66b7e354db68
sha256: 21617503b236c76b27e6cd8999d54348ec739831da28e4cbffaa9f00c71a1582
sha512: 6aff4317d8cdd4d3769ec6f8089376bb7012d2865e686acbf096f2923ac4d55b8ed0f9315fc104dfc409a040fbbf4472327832a738b736bb76e0c163a1b5bacc
ssdeep: 49152:x4TXAXQ0xdG6HVWxbcnDsPGn4J1TeMVwKFMoDC0IOQ13lu:x4H0xA6HMaoPGnfMtMAXm3
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

InternalName: ZRepair.exe
FileVersion: 15.1.1233.4
ProductName: NET Components 4.54 free installer
ProductVersion: 15.1.1233.4
FileDescription: NET Components 4.54 Setup
OriginalFilename: ZRepair.exe
Translation: 0x0409 0x04b0

Trojan.Win32.Ekstak.jesj also known as:

BkavW32.AIDetect.malware2
K7AntiVirusTrojan ( 0053e8521 )
Elasticmalicious (high confidence)
DrWebTrojan.InstallCube.3673
CynetMalicious (score: 100)
CAT-QuickHealTrojan.EkstakPMF.S3724832
ALYacGen:Variant.Zusy.404964
CylanceUnsafe
ZillyaTrojan.Ekstak.Win32.11749
AlibabaTrojan:Win32/Ekstak.3c27ee56
K7GWTrojan ( 0053e8521 )
Cybereasonmalicious.97a54e
CyrenW32/ICLoader.DM.gen!Eldorado
SymantecPUA.ICLoader
ESET-NOD32a variant of Win32/Kryptik.GLCW
APEXMalicious
AvastWin32:ICLoader-X [Adw]
KasperskyTrojan.Win32.Ekstak.jesj
BitDefenderGen:Variant.Zusy.404964
NANO-AntivirusTrojan.Win32.Ekstak.figlds
MicroWorld-eScanGen:Variant.Zusy.404964
TencentMalware.Win32.Gencirc.10cc5315
Ad-AwareGen:Variant.Zusy.404964
SophosGeneric PUA DN (PUA)
ComodoApplication.Win32.ICLoader.GS@84429a
BitDefenderThetaGen:NN.ZexaF.34294.Ks0@aix06Ali
McAfee-GW-EditionBehavesLike.Win32.Generic.vc
FireEyeGeneric.mg.6d9a4c397a54e53d
EmsisoftGen:Variant.Zusy.404964 (B)
SentinelOneStatic AI – Malicious PE
JiangminAdWare.ICLoader.kme
WebrootW32.Trojan.Gen
AviraTR/ICLoader.Gen8
eGambitUnsafe.AI_Score_99%
Antiy-AVLTrojan/Generic.ASMalwS.2818103
MicrosoftTrojan:Win32/Wacatac.A!ml
GDataGen:Variant.Zusy.404964
AhnLab-V3PUP/Win32.ICLoader.R237871
Acronissuspicious
McAfeePacked-FME!6D9A4C397A54
VBA32BScope.Trojan.Downloader
MalwarebytesAdware.ICLoader.Generic
PandaTrj/Genetic.gen
RisingTrojan.Kryptik!1.AA23 (CLASSIC)
YandexTrojan.GenAsa!flUp/Q5Wjxg
IkarusPUA.ICLoader
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/CoinMiner.GYQC!tr
AVGWin32:ICLoader-X [Adw]
Paloaltogeneric.ml

How to remove Trojan.Win32.Ekstak.jesj?

Trojan.Win32.Ekstak.jesj removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment