Trojan

Should I remove “Trojan:Win32/Ekstak.GPB!MTB”?

Malware Removal

The Trojan:Win32/Ekstak.GPB!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Ekstak.GPB!MTB virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Uses Windows utilities for basic functionality
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • CAPE detected the embedded win api malware family
  • Created a service that was not started
  • Uses suspicious command line tools or Windows utilities
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan:Win32/Ekstak.GPB!MTB?


File Info:

name: 54D0F54D5AF468D042A4.mlw
path: /opt/CAPEv2/storage/binaries/5256c441e1bc584364ed0ad55213c3fe1afd1161330d7524618e1eeb25186059
crc32: E100E632
md5: 54d0f54d5af468d042a4a45fe483e22e
sha1: 0cd7acba08d3d195d97aaee45744fdcc47e08cd3
sha256: 5256c441e1bc584364ed0ad55213c3fe1afd1161330d7524618e1eeb25186059
sha512: d449207d5a65c03751d6cf1c10e40212862d140bb155f084dc93df64967f5455a6e81c2bd1701383adeba63cbcee3288181709738b443493654ce97a335f7011
ssdeep: 196608://x1dk9u1+ETh1DPe+kTyBZakZRIlSy3HQJi+kd/WbF:/51dkUDPdBgjw14o
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1B076339C12FDC37BC23D5F7C9C74A372582A78EC35A4650A328785269E1361A4436AFF
sha3_384: e79c3751d652b3e018ecbd8d92c22b31279bd918cd1bdd239f4012581d98a3506370a5d7916d6ad0e6f8572e75168df8
ep_bytes: 558bec83c4c453565733c08945f08945
timestamp: 2023-12-22 16:02:53

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: VectorSTD Setup
FileVersion:
LegalCopyright:
ProductName: VectorSTD
ProductVersion: 1.2.2.2
Translation: 0x0000 0x04b0

Trojan:Win32/Ekstak.GPB!MTB also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Ekstak.4!c
SkyhighBehavesLike.Win32.ObfuscatedPoly.vc
McAfeeArtemis!54D0F54D5AF4
MalwarebytesGeneric.Malware/Suspicious
SangforDropper.Win32.Ekstak.Vkiw
K7AntiVirusTrojan ( 005722f11 )
K7GWTrojan ( 005722f11 )
SymantecTrojan.Gen.MBT
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/TrojanDropper.Agent.SLC
APEXMalicious
CynetMalicious (score: 100)
KasperskyTrojan.Win32.Ekstak.asotu
ViRobotTrojan.Win.Z.Agent.7304582.J
SophosMal/Generic-S
F-SecureTrojan.TR/Drop.Agent.vbhsf
DrWebTrojan.Siggen22.48353
ZillyaTrojan.Ekstak.Win32.76347
GDataWin32.Trojan.Agent.2VX3AK
JiangminTrojan.Ekstak.cils
VaristW32/Agent.UDEG-0687
AviraTR/Drop.Agent.vbhsf
ZoneAlarmTrojan.Win32.Ekstak.asotu
MicrosoftTrojan:Win32/Ekstak.GPB!MTB
AhnLab-V3Trojan/Win.Malware-gen.R628814
DeepInstinctMALICIOUS
Cylanceunsafe
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_GEN.R023H0CLS23
TencentWin32.Trojan.Ekstak.Swhl
YandexTrojan.Ekstak!lyPUz5c0zMA
IkarusTrojan.Win32.Crypt
MaxSecureTrojan.Malware.221766800.susgen
FortinetW32/Agent.SLC!tr
AVGOther:Malware-gen [Trj]
AvastOther:Malware-gen [Trj]
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan:Win32/Ekstak.GPB!MTB?

Trojan:Win32/Ekstak.GPB!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment