Malware

What is “Win32/GenKryptik.EJOX”?

Malware Removal

The Win32/GenKryptik.EJOX is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/GenKryptik.EJOX virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • NtSetInformationThread: attempt to hide thread from debugger
  • Dynamic (imported) function loading detected
  • CAPE extracted potentially suspicious content
  • Authenticode signature is invalid
  • Exhibits behavior characteristics of GuLoader
  • CAPE detected the Guloader malware family

How to determine Win32/GenKryptik.EJOX?


File Info:

name: EA8FA14A9387756A373D.mlw
path: /opt/CAPEv2/storage/binaries/3bcc84b62a4a16ba21bb26d5dbfa4690077a0bf1f0fbb3e4aeea3794ed80f714
crc32: 6C7897B1
md5: ea8fa14a9387756a373d7da52ea642c4
sha1: d38b564a333b0335521ebe3a74bcefba96b047be
sha256: 3bcc84b62a4a16ba21bb26d5dbfa4690077a0bf1f0fbb3e4aeea3794ed80f714
sha512: f5b3aa4caca097095d7a37602a276828e94f8142f6262c2ebba4996d517bd552f62cd96535b0407cc9cca2daece8fd408ba5176fb68e3774a4267e0917dc2dc8
ssdeep: 768:Py9jNMZ2GZcvaE+SGhUDeGUtpynWVatfrdX:K9GUKcvaNSGhUatpygatDdX
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T10D833A15F1E4D476D2688EFC4FB18BE8018BBD3C1C108E07394A3B5F1A76D75A76222A
sha3_384: 6aa92bb04ff2feba5fa888ebba43346b02fa2057de4e2b00a9998480b0e360264b112f6b6f7916642b61f8d5e689437c
ep_bytes: 6894e04000e8f0ffffff000000000000
timestamp: 2012-05-12 02:23:32

Version Info:

Translation: 0x0409 0x04b0
CompanyName: Gasber
ProductName: DETAILISTT
FileVersion: 2.06
ProductVersion: 2.06
InternalName: Wattse9
OriginalFilename: Wattse9.exe

Win32/GenKryptik.EJOX also known as:

BkavW32.AIDetect.malware2
LionicTrojan.Win32.Htsehi.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Heur.PonyStealer.fm0@B0HTSEhi
FireEyeGeneric.mg.ea8fa14a9387756a
CAT-QuickHealTrojan.Ponystealer
McAfeeFareit-FSW!EA8FA14A9387
CylanceUnsafe
K7AntiVirusTrojan ( 00565c151 )
K7GWTrojan ( 00565c151 )
CrowdStrikewin/malicious_confidence_100% (W)
BitDefenderThetaGen:NN.ZevbaCO.34294.fm0@a0HTSEhi
CyrenW32/Trojan.DOY.gen!Eldorado
SymantecPacked.Generic.603
ESET-NOD32a variant of Win32/GenKryptik.EJOX
TrendMicro-HouseCallTrojanSpy.Win32.FAREIT.SMTHF.hp
Paloaltogeneric.ml
KasperskyTrojan.Win32.Vebzenpak.agyy
BitDefenderGen:Heur.PonyStealer.fm0@B0HTSEhi
AvastWin32:DropperX-gen [Drp]
TencentWin32.Trojan.Ponystealer.Amcl
Ad-AwareGen:Heur.PonyStealer.fm0@B0HTSEhi
SophosML/PE-A + Mal/FareitVB-AB
TrendMicroTrojanSpy.Win32.FAREIT.SMTHF.hp
McAfee-GW-EditionBehavesLike.Win32.VBObfus.mz
SentinelOneStatic AI – Suspicious PE
EmsisoftGen:Heur.PonyStealer.fm0@B0HTSEhi (B)
IkarusTrojan.VB.Crypt
AviraHEUR/AGEN.1135506
MicrosoftTrojan:Win32/Wacatac.B!ml
GDataGen:Heur.PonyStealer.fm0@B0HTSEhi
CynetMalicious (score: 99)
AhnLab-V3Trojan/Win32.VBKrypt.R335086
VBA32BScope.Backdoor.Androm
ALYacGen:Heur.PonyStealer.fm0@B0HTSEhi
MalwarebytesTrojan.GuLoader.VB
APEXMalicious
RisingDownloader.Guloader!1.C5B6 (CLASSIC)
MAXmalware (ai score=82)
eGambitUnsafe.AI_Score_97%
FortinetW32/GuLoader.VHIP!tr
AVGWin32:DropperX-gen [Drp]
Cybereasonmalicious.a93877
MaxSecureTrojan.Malware.300983.susgen

How to remove Win32/GenKryptik.EJOX?

Win32/GenKryptik.EJOX removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment