Trojan

Trojan:Win32/Ekstak.ASEF!MTB removal instruction

Malware Removal

The Trojan:Win32/Ekstak.ASEF!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Ekstak.ASEF!MTB virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Uses Windows utilities for basic functionality
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • CAPE detected the embedded win api malware family
  • Created a service that was not started
  • Uses suspicious command line tools or Windows utilities
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan:Win32/Ekstak.ASEF!MTB?


File Info:

name: 685C899CAAB503B3169C.mlw
path: /opt/CAPEv2/storage/binaries/462bfb45e5bce4981b13210bb8d311a683e7564e572f7a6a1683383407237bd6
crc32: AC503B6B
md5: 685c899caab503b3169c9c7a1b696868
sha1: 7f60096b230756881051f01ce4182cb6e346481e
sha256: 462bfb45e5bce4981b13210bb8d311a683e7564e572f7a6a1683383407237bd6
sha512: 8c3d5c373aea67dc15d7581dcbd6258c7383755e40397c33c089b111a99e79debf7286ac5dc0fbeaa7a109e33f32e5830f8ea712fbe5b05028bb40615d09e915
ssdeep: 196608:kZjpTYPOHds+V5isHZwLGMnup4jIm04dD:gjs2drkGM2oIcdD
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T17176331BFD209532E3C459740D8681A29D63727A0B31C3A509ED5BFEAD832E4E14E7F9
sha3_384: 296581d3d0401f973339cc68cfc04c3092696dfc0d93b803bee859c18084a2a2f511a0328704d30860a9f676c9c39b08
ep_bytes: 558bec83c4c453565733c08945f08945
timestamp: 2023-12-22 19:47:53

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: BITResorator Setup
FileVersion:
LegalCopyright:
ProductName: BITResorator
ProductVersion: 1.2.2.2
Translation: 0x0000 0x04b0

Trojan:Win32/Ekstak.ASEF!MTB also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Ekstak.4!c
Elasticmalicious (high confidence)
SkyhighBehavesLike.Win32.ObfuscatedPoly.wc
Cylanceunsafe
SangforDropper.Win32.Ekstak.Vwx0
CrowdStrikewin/malicious_confidence_100% (W)
K7GWTrojan ( 005722f11 )
K7AntiVirusTrojan ( 005722f11 )
SymantecTrojan.Gen.MBT
ESET-NOD32a variant of Win32/TrojanDropper.Agent.SLC
CynetMalicious (score: 100)
APEXMalicious
KasperskyTrojan.Win32.Ekstak.asqfp
ViRobotTrojan.Win.Z.Agent.7412740.CF
AvastOther:Malware-gen [Trj]
TencentWin32.Trojan.Ekstak.Anhl
F-SecureTrojan.TR/Drop.Agent.tcoak
DrWebTrojan.Siggen22.48705
ZillyaTrojan.Ekstak.Win32.76354
TrendMicroTROJ_GEN.R002C0DAE24
SophosMal/Generic-S
IkarusTrojan.Win32.Crypt
VaristW32/Agent.NFDP-7001
AviraTR/Drop.Agent.tcoak
KingsoftWin32.Trojan.Ekstak.asqfp
MicrosoftTrojan:Win32/Ekstak.ASEF!MTB
ZoneAlarmTrojan.Win32.Ekstak.asqfp
GDataWin32.Trojan.Agent.4EVOU5
AhnLab-V3Trojan/Win.Malware-gen.R628855
McAfeeArtemis!685C899CAAB5
MalwarebytesGeneric.Malware/Suspicious
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_GEN.R002C0DAE24
MaxSecureTrojan.Malware.221766517.susgen
FortinetW32/Agent.SLC!tr
AVGOther:Malware-gen [Trj]
DeepInstinctMALICIOUS

How to remove Trojan:Win32/Ekstak.ASEF!MTB?

Trojan:Win32/Ekstak.ASEF!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment