Trojan

Trojan:Win32/Ekstak!pz removal guide

Malware Removal

The Trojan:Win32/Ekstak!pz is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Ekstak!pz virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities to create a scheduled task
  • Behavioural detection: Transacted Hollowing
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan:Win32/Ekstak!pz?


File Info:

name: 14116B4396CC0970B0E2.mlw
path: /opt/CAPEv2/storage/binaries/744d051220929edf65c500c61fd4c9df8a744945349b0411edaac869409f3909
crc32: 48015DD5
md5: 14116b4396cc0970b0e2109305c36f13
sha1: 304489666d73d2c78d4dc3b71e817a6f74d65f0f
sha256: 744d051220929edf65c500c61fd4c9df8a744945349b0411edaac869409f3909
sha512: 2f9ec4f2988df66d025e3ff33a6d082cd81f41250db20290e2b6fc4efd19b719fb1619feb52c3dbaebf2e6e8c45bae9bfc8b2e44ebe5930030bcf83fe6889bfd
ssdeep: 196608:cJxmsIvKaSCyaVvdiuecJANCf0xcXiUtW81Ldd:cJxmsIvKaSov8cJaCY3UtW8t
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1BD76333310D35EE7E884B17970253C81A6A239735478358424DF896E2B3FA36B7BE356
sha3_384: 7f623ce8af17825e7a5d53623552fe0f9807db5a0e58f078bd14597e51fadf15bf28057d6591f047d5fd87f825949f6b
ep_bytes: 558bec83c4c453565733c08945f08945
timestamp: 2023-11-24 20:10:49

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: VideoREP Setup
FileVersion:
LegalCopyright:
ProductName: VideoREP
ProductVersion:
Translation: 0x0000 0x04b0

Trojan:Win32/Ekstak!pz also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Ekstak.4!c
MicroWorld-eScanGen:Variant.Jaik.203228
FireEyeGen:Variant.Jaik.203228
SkyhighBehavesLike.Win32.ObfuscatedPoly.vc
McAfeeArtemis!14116B4396CC
Cylanceunsafe
ZillyaTrojan.Ekstak.Win32.75076
K7AntiVirusTrojan ( 005722fe1 )
AlibabaTrojanDropper:Win32/Ekstak.3cc7cdc2
K7GWTrojan ( 005722fe1 )
CrowdStrikewin/malicious_confidence_90% (D)
ArcabitTrojan.Jaik.D319DC
SymantecTrojan.Gen.MBT
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/TrojanDropper.Agent.SLC
CynetMalicious (score: 100)
APEXMalicious
KasperskyTrojan.Win32.Ekstak.apvul
BitDefenderGen:Variant.Jaik.203228
AvastOther:Malware-gen [Trj]
Ad-AwareGen:Variant.Jaik.203228
EmsisoftGen:Variant.Jaik.203228 (B)
F-SecureTrojan.TR/Drop.Agent.jhopp
VIPREGen:Variant.Jaik.203228
TrendMicroTROJ_GEN.R023C0XKU23
SophosMal/Generic-S
IkarusTrojan-Dropper.Win32.Agent
JiangminTrojan.Ekstak.cihn
VaristW32/Trojan.YDFI-4714
AviraTR/Drop.Agent.jhopp
MicrosoftTrojan:Win32/Ekstak!pz
ZoneAlarmTrojan.Win32.Ekstak.apvul
GDataGen:Variant.Jaik.203228
AhnLab-V3Trojan/Win.Generic.R622358
ALYacGen:Variant.Jaik.203228
MAXmalware (ai score=81)
MalwarebytesAdware.DownloadAssistant
TrendMicro-HouseCallTROJ_GEN.R023C0XKU23
SentinelOneStatic AI – Suspicious PE
MaxSecureTrojan.Malware.220903487.susgen
FortinetW32/Agent.SLC!tr
AVGOther:Malware-gen [Trj]
DeepInstinctMALICIOUS

How to remove Trojan:Win32/Ekstak!pz?

Trojan:Win32/Ekstak!pz removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment