Malware

About “Win32/Kryptik.BAS” infection

Malware Removal

The Win32/Kryptik.BAS is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.BAS virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Russian
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • CAPE detected the shellcode patterns malware family
  • Creates a copy of itself
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Win32/Kryptik.BAS?


File Info:

name: 8A48F229C45F61B264C7.mlw
path: /opt/CAPEv2/storage/binaries/45f5ee6badd36d21f4381f37f982473ea85e787c985f329de2fb5a3e3c8e6ee8
crc32: C3412AA0
md5: 8a48f229c45f61b264c7a2b0e8422508
sha1: 75987f2c2147290de0987efdb1d21ba09c05b7d4
sha256: 45f5ee6badd36d21f4381f37f982473ea85e787c985f329de2fb5a3e3c8e6ee8
sha512: f95e372f9680a1e9c174a07e8399880b67f1b44fb2a69438ffb8d6d656849260021ce87cbfd258094e7b0badb0d92464f9cb17585eb27b1f12c43d97b9aa50c3
ssdeep: 6144:viJr/nj3woKp7HHFlq1dEHDu+qLTMFqDxHe8A:6JDj3wNHHqKq+BFYxHG
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T14C342330416B7195C04E933C69201A2068F9E1299D2EE9E4E4F1BE4BDEE33E56B1977C
sha3_384: 22441c54fa470b35e070cf66400ec8730497225f81cc0c410c4bf99479eea99646dbba4443e3ec9c9b802b817659558c
ep_bytes: b9fb26ac67558bec83ec7083c19a81e2
timestamp: 2008-05-16 05:41:30

Version Info:

0: [No Data]

Win32/Kryptik.BAS also known as:

BkavW32.AIDetectMalware
tehtrisGeneric.Malware
MicroWorld-eScanGen:Variant.Zbot.6
FireEyeGeneric.mg.8a48f229c45f61b2
SkyhighArtemis!Trojan
McAfeeGenericRXAA-FA!8A48F229C45F
Cylanceunsafe
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 0001140e1 )
AlibabaVirTool:Win32/Obfuscator.555c5b4e
K7GWTrojan ( 0001140e1 )
Cybereasonmalicious.9c45f6
BitDefenderThetaAI:Packer.CC296D081F
VirITTrojan.Win32.Agent.BEE
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Kryptik.BAS
APEXMalicious
AvastWin32:Rootkit-gen [Rtk]
CynetMalicious (score: 100)
KasperskyPacked.Win32.Krap.ah
BitDefenderGen:Variant.Zbot.6
NANO-AntivirusTrojan.Win32.Krap.bjtxl
TencentWin32.Packed.Krap.Zmhl
EmsisoftGen:Variant.Zbot.6 (B)
F-SecureTrojan.TR/Crypt.ZPACK.Gen
DrWebTrojan.Packed.683
VIPREGen:Variant.Zbot.6
TrendMicroMal_Krap-3
Trapminemalicious.high.ml.score
SophosMal/FakeAV-BX
SentinelOneStatic AI – Malicious PE
GDataGen:Variant.Zbot.6
JiangminTrojan/Agent.czye
VaristW32/Klik.A.gen!Eldorado
AviraTR/Crypt.ZPACK.Gen
Antiy-AVLTrojan[Packed]/Win32.Krap
KingsoftWin32.Troj.Undef.a
XcitiumSuspicious@#1bqxocfu95wtu
ArcabitTrojan.Zbot.6
ZoneAlarmPacked.Win32.Krap.ah
MicrosoftVirTool:Win32/Obfuscator.HG
GoogleDetected
VBA32BScope.Trojan.Packed
ALYacGen:Variant.Zbot.6
TACHYONTrojan/W32.Krap.233472.O
PandaTrj/Genetic.gen
TrendMicro-HouseCallMal_Krap-3
RisingTrojan.Generic@AI.92 (RDML:E7mWsSsAE5I4jusRLD11yw)
YandexTrojan.CL.Klik!wYmiOFILy0Y
IkarusTrojan.Win32.Crypt
FortinetW32/Krap.AH!tr
AVGWin32:Rootkit-gen [Rtk]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)
alibabacloudVirtool:Win/Krap.ah

How to remove Win32/Kryptik.BAS?

Win32/Kryptik.BAS removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment