Trojan

Trojan:Win32/InjectorCrypt!pz removal guide

Malware Removal

The Trojan:Win32/InjectorCrypt!pz is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/InjectorCrypt!pz virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • HTTPS urls from behavior.
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Deletes executed files from disk
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan:Win32/InjectorCrypt!pz?


File Info:

name: D34DDAB1AAB0580E206E.mlw
path: /opt/CAPEv2/storage/binaries/f74c734cecaa2b2c0295cdea8a1492a3c1f6ff5b1a84c7d9ad3586952706a0c5
crc32: 19D0789C
md5: d34ddab1aab0580e206e71cd5f3b7539
sha1: c860dced155b2aa299027ae99aa23b2da129be3f
sha256: f74c734cecaa2b2c0295cdea8a1492a3c1f6ff5b1a84c7d9ad3586952706a0c5
sha512: cc4472d79cd2b2b4001b4294c004d2bcd040e58e83e70056944d551cb48f9c7776604a7cdb8924467a4e587772077b04a40b7b2a996ff0f2799713428151ca13
ssdeep: 3072:tKtj4E7sEoFoQjvBgh8QRxtAtB+TmvJJ70X2joH8tIYNUsAMfL5lEr/r/Q:tKf7DoXjv+H4yGyX0okUsTj5lQ/r/Q
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T1F5D3024BC27BCD10E12D76F3D22A97D46796E24290932504493C6DAAFBDCB45CF253E2
sha3_384: 32a52fed461fc6774738fc0ffdc2c2a6ee6a929c49c1e84acb47de18fb7ff3d6f0646674c9dd3d8aeabfa7375844f3c5
ep_bytes: 5589e5b90000000089c601d709d74f89
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Trojan:Win32/InjectorCrypt!pz also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Copak.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Trojan.Heur.imW@!hBy@@e
SkyhighBehavesLike.Win32.Generic.cm
McAfeeGenericRXAA-FA!D34DDAB1AAB0
Cylanceunsafe
ZillyaTrojan.CopakGen.Win32.1
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 0058c5ff1 )
AlibabaTrojan:Win32/Copak.3c91222d
K7GWTrojan ( 0058c5ff1 )
Cybereasonmalicious.d155b2
ArcabitTrojan.Heur.EFD32A
SymantecML.Attribute.HighConfidence
tehtrisGeneric.Malware
ESET-NOD32a variant of Win32/Injector.DZQA
CynetMalicious (score: 100)
APEXMalicious
KasperskyHEUR:Trojan.Win32.Copak.pef
BitDefenderGen:Trojan.Heur.imW@!hBy@@e
AvastWin32:Evo-gen [Trj]
RisingTrojan.Injector!1.C865 (CLASSIC)
EmsisoftGen:Trojan.Heur.imW@!hBy@@e (B)
F-SecureTrojan.TR/Crypt.XPACK.Gen
DrWebTrojan.Packed2.43250
VIPREGen:Trojan.Heur.imW@!hBy@@e
SophosMal/HckPk-A
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Copak.jck
VaristW32/Kryptik.DZR.gen!Eldorado
AviraTR/Crypt.XPACK.Gen
MAXmalware (ai score=85)
Antiy-AVLTrojan/Win32.Injector
XcitiumPacked.Win32.MUPX.Gen@24tbus
MicrosoftTrojan:Win32/InjectorCrypt!pz
ZoneAlarmHEUR:Trojan.Win32.Copak.pef
GDataGen:Trojan.Heur.imW@!hBy@@e
GoogleDetected
AhnLab-V3Malware/Win32.Generic.C2860595
BitDefenderThetaAI:Packer.335106D81B
VBA32BScope.Trojan.Wacatac
MalwarebytesTrojan.MalPack.Generic
PandaTrj/Genetic.gen
TencentTrojan.Win32.Copak.pe
IkarusTrojan.Win32.Injector
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.EAHK!tr
AVGWin32:Evo-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan:Win32/InjectorCrypt!pz?

Trojan:Win32/InjectorCrypt!pz removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment