Trojan

How to remove “Trojan:Win32/Ekstak!pz”?

Malware Removal

The Trojan:Win32/Ekstak!pz is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Ekstak!pz virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Uses Windows utilities for basic functionality
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities to create a scheduled task
  • Created a service that was not started
  • Uses suspicious command line tools or Windows utilities
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan:Win32/Ekstak!pz?


File Info:

name: 95A67190BEF04FDB0846.mlw
path: /opt/CAPEv2/storage/binaries/f649a2d3a88ad3a56ed3e0d9a3d3cd476a97672cc25f88122ad7bad168f7ad69
crc32: 67D09C54
md5: 95a67190bef04fdb08465b929aabcf77
sha1: 6d15b63872768493f44219d2f048a24409783eee
sha256: f649a2d3a88ad3a56ed3e0d9a3d3cd476a97672cc25f88122ad7bad168f7ad69
sha512: 68f9b549e94c7951b59a8484edc3970b35d8bddb936802d0b5d705f1fee5b82e19cfdc16d6087432011907a7c255d81a6470d88d4a04a3c34277c3f8ba4d3f9d
ssdeep: 49152:52r5FA7K1OopyYq0JunYOfFy0PzqIZG9p6zM7ikvPURaH3XE4hX86tGoWrrKUTdq:sr52zY40My0bAHvsAH//Wrf/kDd
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T170F5330F801F467AF2A15DF80F96A913BA5DB5266C7134463FAC51DD9BFE3C1280E262
sha3_384: 073b466fb68a176f0e00fc77584776478e9e26565eaf01051b9ec8d28ec55c874f52588488a62c8a20d1676818b641ee
ep_bytes: 558bec83c4c453565733c08945f08945
timestamp: 2023-11-29 23:25:25

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: VolumeUTIL Setup
FileVersion:
LegalCopyright:
ProductName: VolumeUTIL
ProductVersion:
Translation: 0x0000 0x04b0

Trojan:Win32/Ekstak!pz also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Injuke.16!c
Elasticmalicious (high confidence)
SkyhighBehavesLike.Win32.ObfuscatedPoly.wc
Cylanceunsafe
ZillyaTrojan.Injuke.Win32.38006
SangforDropper.Win32.Injuke.Vpn5
K7AntiVirusTrojan ( 005722f11 )
AlibabaTrojanDropper:Win32/Injuke.a467d4b0
K7GWTrojan ( 005722f11 )
SymantecTrojan.Gen.MBT
ESET-NOD32a variant of Win32/TrojanDropper.Agent.SLC
CynetMalicious (score: 99)
APEXMalicious
ClamAVWin.Malware.Injuke-10015915-0
KasperskyTrojan.Win32.Injuke.kalz
AvastOther:Malware-gen [Trj]
TencentWin32.Trojan.Injuke.Ocnw
SophosMal/Generic-S
F-SecureHeuristic.HEUR/AGEN.1332570
DrWebTrojan.Siggen22.20078
TrendMicroTROJ_GEN.R002C0DL523
GDataWin32.Trojan.Agent.Q3XUCK
JiangminTrojan.Ekstak.cihn
VaristW32/Ekstak.IX.gen!Eldorado
AviraHEUR/AGEN.1332570
KingsoftWin32.Trojan.Injuke.kalz
ZoneAlarmTrojan.Win32.Injuke.kalz
MicrosoftTrojan:Win32/Ekstak!pz
AhnLab-V3Trojan/Win.DownloadAssistant.R622897
McAfeeArtemis!95A67190BEF0
MalwarebytesBackdoor.TVRat.Generic
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_GEN.R002C0DL523
YandexTrojan.Injuke!ALOx/12A4HA
IkarusTrojan-Dropper.Win32.Agent
MaxSecureTrojan.Malware.221078621.susgen
FortinetW32/Agent.SLC!tr
AVGOther:Malware-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan:Win32/Ekstak!pz?

Trojan:Win32/Ekstak!pz removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment