Malware

About “Win32/Injector.EPSK” infection

Malware Removal

The Win32/Injector.EPSK is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Injector.EPSK virus can do?

  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Executable code extraction
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Reads data out of its own binary image
  • A process created a hidden window
  • Drops a binary and executes it
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Looks up the external IP address
  • Executed a process and injected code into it, probably while unpacking
  • Sniffs keystrokes
  • Steals private information from local Internet browsers
  • Installs itself for autorun at Windows startup
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Detects VirtualBox through the presence of a file
  • Detects VMware through the presence of a file
  • Creates a copy of itself
  • Attempts to access Bitcoin/ALTCoin wallets
  • Harvests credentials from local FTP client softwares
  • Harvests information related to installed mail clients
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz
icanhazip.com

How to determine Win32/Injector.EPSK?


File Info:

crc32: 8F9C3EB2
md5: dd22c56eee05561a22790f50f055e414
name: DD22C56EEE05561A22790F50F055E414.mlw
sha1: 6a998df0b9cff5107428828b8c20311db7af2f5c
sha256: 4c36f7e39a087a5b2998d8c21bc0d27ba4485f040b94ffeced27b307d08f64b1
sha512: 3de0b71a45417c2217059e67c24569db150e3d4863ac10719e5803326e75a2e43bb40f3772d2cc52f3200183b5aabb538243e9cf02f3ff4819358d7e524b74bb
ssdeep: 12288:nMwPr4+Vx85zBll+O6D5UssqX/9POISFxKOGh3FgknLffect7DMSxogSC43ldmd:nMwDRfW9lwOUet1xzmxfectvTx0C436d
type: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive

Version Info:

0: [No Data]

Win32/Injector.EPSK also known as:

BkavW32.AIDetect.malware1
K7AntiVirusTrojan ( 0057f09a1 )
Elasticmalicious (high confidence)
DrWebTrojan.Inject4.13947
CynetMalicious (score: 100)
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_90% (W)
AlibabaTrojan:Win32/Injector.3bb442f7
K7GWTrojan ( 0057f09a1 )
Cybereasonmalicious.eee055
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Injector.EPSK
APEXMalicious
AvastWin32:MalwareX-gen [Trj]
KasperskyTrojan.Win32.Agent.xaiazr
BitDefenderTrojan.GenericKD.37214445
MicroWorld-eScanTrojan.GenericKD.37214445
Ad-AwareTrojan.GenericKD.37214445
SophosGeneric ML PUA (PUA)
TrendMicroTROJ_FRS.VSNW0AG21
McAfee-GW-EditionBehavesLike.Win32.ICLoader.jc
FireEyeGeneric.mg.dd22c56eee05561a
EmsisoftTrojan.GenericKD.37214445 (B)
SentinelOneStatic AI – Malicious PE
WebrootW32.Stelega
AviraHEUR/AGEN.1141442
KingsoftWin32.PSWTroj.Undef.(kcloud)
MicrosoftTrojan:Win32/Woreflint.A!cl
ArcabitTrojan.Jaik.DB6B4
GDataTrojan.GenericKD.37214445
AhnLab-V3Trojan/Win.Spynoon.R430115
McAfeeArtemis!DD22C56EEE05
MAXmalware (ai score=85)
PandaTrj/CI.A
IkarusWin32.SuspectCrc
FortinetW32/Injector.EOZI!tr
AVGWin32:MalwareX-gen [Trj]
Paloaltogeneric.ml
Qihoo-360Win32/Trojan.Generic.HoMASYIA

How to remove Win32/Injector.EPSK?

Win32/Injector.EPSK removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment