Trojan

Trojan:Win32/Ekstak.ASDX!MTB removal tips

Malware Removal

The Trojan:Win32/Ekstak.ASDX!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Ekstak.ASDX!MTB virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Uses Windows utilities for basic functionality
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • CAPE detected the embedded win api malware family
  • Created a service that was not started
  • Uses suspicious command line tools or Windows utilities
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan:Win32/Ekstak.ASDX!MTB?


File Info:

name: 4E5B5CDA424DC5AE4370.mlw
path: /opt/CAPEv2/storage/binaries/dc313d34b30a44e3ebad4a8891e369bd9d03b514186887ed596309573a933e30
crc32: 39B121FB
md5: 4e5b5cda424dc5ae437020ffbf0f226b
sha1: 007a3eb087f66ce636173376fdf88483300718be
sha256: dc313d34b30a44e3ebad4a8891e369bd9d03b514186887ed596309573a933e30
sha512: 1277f86ac569f9f6833987a945a4e2c0d1edf44c9b7863794cfdfc583b964af4f16a27448d61163809396161cad5c9da8de579f413dadac4f9375abe9a56b9f5
ssdeep: 196608:3cEFVW+OaVJ5HBG8j01qf4yaH8EGC0HIyxa4k8YbBMy44dD:3cMVWpaMRyacG0HRNkTMQdD
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1B176332BD5348C3BD6D2FFB2BE525134DC8643A20478B08EA28F9D4895BD1531AE16DF
sha3_384: 5b7131cf41386177ea053f7dea49d1ae78641f440f0d0badf10eda1d1bb1a3c1b53ae142f76222e71599518611bbfd31
ep_bytes: 558bec83c4c453565733c08945f08945
timestamp: 2023-12-23 09:08:00

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: DataManageLIB Setup
FileVersion:
LegalCopyright:
ProductName: DataManageLIB
ProductVersion: 1.2.2.3
Translation: 0x0000 0x04b0

Trojan:Win32/Ekstak.ASDX!MTB also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Ekstak.4!c
Elasticmalicious (high confidence)
SkyhighBehavesLike.Win32.ObfuscatedPoly.wc
McAfeeArtemis!4E5B5CDA424D
Cylanceunsafe
ZillyaTrojan.Ekstak.Win32.76374
SangforDropper.Win32.Ekstak.V97b
K7AntiVirusTrojan ( 005722f11 )
K7GWTrojan ( 005722f11 )
CrowdStrikewin/malicious_confidence_100% (W)
SymantecTrojan.Gen.MBT
ESET-NOD32a variant of Win32/TrojanDropper.Agent.SLC
CynetMalicious (score: 100)
APEXMalicious
KasperskyTrojan.Win32.Ekstak.asvqh
AvastOther:Malware-gen [Trj]
TencentWin32.Trojan.Ekstak.Hmnw
SophosMal/Generic-S
F-SecureTrojan.TR/Drop.Agent.kpisl
DrWebTrojan.Siggen22.49658
TrendMicroTROJ_GEN.R023C0DLT23
IkarusTrojan.Win32.Crypt
VaristW32/Trojan.IRUK-9379
AviraTR/Drop.Agent.kpisl
KingsoftWin32.Trojan.Ekstak.asvqh
MicrosoftTrojan:Win32/Ekstak.ASDX!MTB
ZoneAlarmTrojan.Win32.Ekstak.asvqh
GDataWin32.Trojan.Agent.3KEFVE
AhnLab-V3Trojan/Win.Malware-gen.C5566596
MalwarebytesTrojan.Injector
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_GEN.R023C0DLT23
MaxSecureTrojan.Malware.221810919.susgen
FortinetW32/Agent.SLC!tr
AVGOther:Malware-gen [Trj]
DeepInstinctMALICIOUS

How to remove Trojan:Win32/Ekstak.ASDX!MTB?

Trojan:Win32/Ekstak.ASDX!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment