Malware

What is “Win32/GenKryptik.EZGE”?

Malware Removal

The Win32/GenKryptik.EZGE is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/GenKryptik.EZGE virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • Attempts to connect to a dead IP:Port (18 unique times)
  • Starts servers listening on 0.0.0.0:2425
  • Reads data out of its own binary image
  • A process created a hidden window
  • Drops a binary and executes it
  • Performs some HTTP requests
  • Unconventionial language used in binary resources: Ukrainian
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Uses Windows utilities for basic functionality
  • Enumerates services, possibly for anti-virtualization
  • Executed a process and injected code into it, probably while unpacking
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Installs itself for autorun at Windows startup
  • A possible cryptomining command was executed
  • Attempts to interact with an Alternate Data Stream (ADS)
  • Anomalous binary characteristics

Related domains:

microsoft-com.mail.protection.outlook.com
181.86.68.138.dnsbl.sorbs.net
181.86.68.138.bl.spamcop.net
181.86.68.138.zen.spamhaus.org
181.86.68.138.sbl-xbl.spamhaus.org
181.86.68.138.cbl.abuseat.org
msr.pool-pay.com
www.instagram.com
m.jdsports.nl
www.net-a-porter.com
dwgin-production-eu01-snipes.demandware.net

How to determine Win32/GenKryptik.EZGE?


File Info:

crc32: C8E2690A
md5: e40db2b89a2576a6e05756e24fafc164
name: E40DB2B89A2576A6E05756E24FAFC164.mlw
sha1: 201817ac3a60be06100528a20ab7090950fac43f
sha256: 3c585756b95bebfe9883e90da81d2fe1c132146343eafddf29a1569067914fe0
sha512: 444c152496a59c1cdc8e50285978f21f110a81f051942f6dad87c8d9f2804598474dbee8a25eb0cd7d290d8119014258d941f631d2df3b04d70c20e19af71e8e
ssdeep: 3072:ZVrzMhHieqWocUxvWt+rlSaYZM64TL09k:ghHieO5wA5SopL0
type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed

Version Info:

InternalSurname: debaukd.ekze
Prod: 1.2.7
FileVersions: 1.0.5.6
LegalCo: Copyri (C) 2019, permudationzi

Win32/GenKryptik.EZGE also known as:

Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Bulz.287247
FireEyeGeneric.mg.e40db2b89a2576a6
CylanceUnsafe
SangforMalware
BitDefenderGen:Variant.Bulz.287247
SymantecML.Attribute.HighConfidence
APEXMalicious
KasperskyHEUR:Trojan.Win32.AntiAV.vho
Ad-AwareGen:Variant.Bulz.287247
EmsisoftGen:Variant.Bulz.287247 (B)
McAfee-GW-EditionBehavesLike.Win32.Trojan.cc
eGambitUnsafe.AI_Score_85%
MicrosoftTrojan:Win32/Wacatac.D3!ml
ZoneAlarmHEUR:Trojan.Win32.AntiAV.vho
GDataWin32.Backdoor.Tofsee.B1PQEY
CynetMalicious (score: 100)
Acronissuspicious
McAfeeRDN/Generic.dx
MalwarebytesTrojan.MalPack.GS
ESET-NOD32a variant of Win32/GenKryptik.EZGE
RisingBackdoor.Agent!8.C5D (TFE:5:IhzqwXEXQUL)
SentinelOneStatic AI – Malicious PE
FortinetW32/Kryptik.HGHW!tr
BitDefenderThetaGen:NN.ZexaF.34700.jmGfa4q!4Rcc
CrowdStrikewin/malicious_confidence_100% (D)
Qihoo-360HEUR/QVM11.1.413F.Malware.Gen

How to remove Win32/GenKryptik.EZGE?

Win32/GenKryptik.EZGE removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment