Malware

Win32/Kryptik.BUYX removal instruction

Malware Removal

The Win32/Kryptik.BUYX is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.BUYX virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • A process attempted to delay the analysis task.
  • Dynamic (imported) function loading detected
  • Performs HTTP requests potentially not found in PCAP.
  • HTTPS urls from behavior.
  • CAPE extracted potentially suspicious content
  • Unconventionial binary language: Russian
  • Unconventionial language used in binary resources: Russian
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Deletes its original binary from disk
  • Behavioural detection: Injection (inter-process)
  • Behavioural detection: Injection with CreateRemoteThread in a remote process
  • Attempts to modify proxy settings
  • CAPE detected injection into a browser process, likely for Man-In-Browser (MITB) infostealing

How to determine Win32/Kryptik.BUYX?


File Info:

name: F334AFAED79AF1B01809.mlw
path: /opt/CAPEv2/storage/binaries/a057ba56ead3556e6902dc074ade457502191e8789a31ace87560495c88fefce
crc32: FE826191
md5: f334afaed79af1b0180915a6f026a028
sha1: 2286cae66b3d2d5d9b3f9d04733ff36a95fdcf96
sha256: a057ba56ead3556e6902dc074ade457502191e8789a31ace87560495c88fefce
sha512: 636fe09610f93b9243e89e9d71eac3a1bf7dfa5294ab48274cf49d6e44f5578aa9a47bbbc8a8ed649bc04220370d0c21f2b3a2bf61d38934ecfd92dbb75d80c9
ssdeep: 768:2yMtnHtvgXT30XpU6URhEVzJ9MNd05XhJD0dmphpKpSpzv4CkD/:2rHJg4ZPCE1JFnD0dCvu
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1CF13E636259B88BBF3E79F78BCAA2B6508636D73DB05F0F314594C8C8435691D070E2A
sha3_384: 359206556f31b370882082a66711d14c0f3441a0087e71549fa3b6fbbad55b9525500b8f48d4f2c0389c12ffc41f4ad3
ep_bytes: 558bec892da0854000e872fdffff5dc3
timestamp: 2012-12-06 04:23:36

Version Info:

CompanyName: Корпорация Майкрософт
FileDescription: ProQuota
FileVersion: 5.1.2600.5512 (xpsp.080413-2113)
InternalName: proquota
LegalCopyright: © Корпорация Майкрософт. Все права защищены.
OriginalFilename: proquota.exe
ProductName: Операционная система Microsoft® Windows®
ProductVersion: 5.1.2600.5512
Translation: 0x0419 0x04b0

Win32/Kryptik.BUYX also known as:

LionicTrojan.Win32.Injector.4!c
Elasticmalicious (high confidence)
CynetMalicious (score: 100)
FireEyeGeneric.mg.f334afaed79af1b0
ALYacGen:Heur.Japik.6
CylanceUnsafe
ZillyaTrojan.FakeAV.Win32.244438
SangforTrojan.Win32.Injector.gnqs
K7AntiVirusTrojan ( 0040f02a1 )
AlibabaVirTool:Win32/Obfuscator.44fb629d
K7GWTrojan ( 0040f02a1 )
Cybereasonmalicious.ed79af
VirITTrojan.Win32.Generic.VCK
CyrenW32/S-79760d50!Eldorado
SymantecPacked.Generic.459
ESET-NOD32a variant of Win32/Kryptik.BUYX
APEXMalicious
Paloaltogeneric.ml
KasperskyTrojan-Dropper.Win32.Injector.gnqs
BitDefenderGen:Heur.Japik.6
NANO-AntivirusTrojan.Win32.Inject.bdfjtq
SUPERAntiSpywareTrojan.Agent/Gen-Kryptik
MicroWorld-eScanGen:Heur.Japik.6
AvastWin32:Karagany
TencentWin32.Trojan-dropper.Injector.Eamm
Ad-AwareGen:Heur.Japik.6
SophosMal/Generic-R + Troj/Zbot-DHN
ComodoTrojWare.Win32.Kryptik.ARJD@4t2k3w
DrWebTrojan.DownLoader7.3225
VIPRETrojan.Win32.FakeAlert.bns (v)
TrendMicroTROJ_SIGEKAF.SM
McAfee-GW-EditionPWS-Zbot.gen.xd
EmsisoftGen:Heur.Japik.6 (B)
GDataGen:Heur.Japik.6
JiangminTrojanDropper.Injector.bokk
WebrootW32.Rogue.Gen
AviraTR/Crypt.ZPACK.Gen
MAXmalware (ai score=99)
Antiy-AVLTrojan[Dropper]/Win32.Injector
KingsoftWin32.Heur.KVMH019.a.(kcloud)
ArcabitTrojan.Japik.6
ZoneAlarmTrojan-Dropper.Win32.Injector.gnqs
MicrosoftRogue:Win32/FakeDef
AhnLab-V3Dropper/Win32.Injector.R47014
Acronissuspicious
McAfeePWS-Zbot.gen.xd
TACHYONTrojan/W32.Small.45440.G
VBA32BScope.Malware-Cryptor.SB.01798
MalwarebytesGeneric.Malware/Suspicious
TrendMicro-HouseCallTROJ_SIGEKAF.SM
RisingDropper.Injector!8.DC (CLOUD)
IkarusTrojan-Dropper.Win32.Injector
eGambitGeneric.Downloader
FortinetW32/Zbot.APRF!tr
BitDefenderThetaGen:NN.ZexaF.34212.cq1@aix3cvmc
AVGWin32:Karagany
PandaTrj/Agent.MIZ
CrowdStrikewin/malicious_confidence_90% (W)
MaxSecureTrojan.Malware.4950784.susgen

How to remove Win32/Kryptik.BUYX?

Win32/Kryptik.BUYX removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment