Categories: Malware

Win32/Kryptik.DROO (file analysis)

The Win32/Kryptik.DROO is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.DROO virus can do?

  • Executable code extraction
  • Enumerates user accounts on the system
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • A process created a hidden window
  • Drops a binary and executes it
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Creates an excessive number of UDP connection attempts to external IP addresses
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • Looks up the external IP address
  • Uses Windows utilities for basic functionality
  • Attempts to delete volume shadow copies
  • Deletes its original binary from disk
  • Modifies boot configuration settings
  • Exhibits behavior characteristic of Cerber ransomware
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Mimics the file times of a Windows system file
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • EternalBlue behavior
  • Attempts to identify installed AV products by installation directory
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Generates some ICMP traffic
  • Uses suspicious command line tools or Windows utilities

Related domains:

z.whorecord.xyz
a.tomx.xyz
ipinfo.io

How to determine Win32/Kryptik.DROO?


File Info:

crc32: A647F1DDmd5: b75cd62cb4c20c0637fa6a5a2e725d2dname: B75CD62CB4C20C0637FA6A5A2E725D2D.mlwsha1: 1288b484803e45156640d1d93997e1cd2db72517sha256: 604ae86b204bc4a56b405feef921cd14a8e6bc75fe65194ceb8c27e32227ce25sha512: eb9c33d85e125304fafa7d8bf86cfdf9682a042fe32c321d42dd9d2f0c071ff7bf3ac8784bbe3611c5398ea6492a19841c8288e86aaf368afdf474e0f461b234ssdeep: 3072:xWXVvlOE6nWPL49YQFbSsKjOUr05zvYyarw2sBYNdVmcHkraMT7y2tn++++y+++:0lOEGYs9YQUFr05cU2sGNH0rfTjpetype: MS-DOS executable, MZ for MS-DOS

Version Info:

0: [No Data]

Win32/Kryptik.DROO also known as:

Bkav W32.AIDetect.malware2
K7AntiVirus Trojan ( 0055e3ef1 )
DrWeb Trojan.KillProc.41708
Cynet Malicious (score: 100)
Cylance Unsafe
Sangfor Suspicious.Win32.Save.a
CrowdStrike win/malicious_confidence_60% (D)
Alibaba Ransom:Win32/Zerber.1af22003
K7GW Trojan ( 0055e3ef1 )
Cybereason malicious.4803e4
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/Kryptik.DROO
APEX Malicious
Avast FileRepMalware
ClamAV Win.Ransomware.Cerber-7557682-0
Kaspersky Trojan-Ransom.Win32.Zerber.dto
NANO-Antivirus Trojan.Win32.Zerber.eibrgz
Tencent Malware.Win32.Gencirc.114bad59
Sophos Mal/Generic-S
Comodo Malware@#9a2jgr4hiady
BitDefenderTheta Gen:NN.ZexaF.34170.pmqaaK9AAyhi
VIPRE Trojan.Win32.Generic!BT
TrendMicro Ransom_CERBER.F116JS
McAfee-GW-Edition BehavesLike.Win32.Generic.dc
FireEye Generic.mg.b75cd62cb4c20c06
SentinelOne Static AI – Malicious PE
Jiangmin Trojan.Zerber.hq
Avira TR/AD.Cerber.ezxiz
eGambit Unsafe.AI_Score_97%
Antiy-AVL Trojan/Generic.ASMalwS.1906987
Kingsoft Win32.Heur.KVMH008.a.(kcloud)
Microsoft Trojan:Win32/Tnega!ml
TACHYON Ransom/W32.Cerber.248832
McAfee Artemis!B75CD62CB4C2
VBA32 Hoax.Zerber
Panda Trj/CI.A
TrendMicro-HouseCall Ransom_CERBER.F116JS
Yandex Trojan.Zerber!mkNkroZ/Kug
Ikarus Trojan.Win32.Filecoder
Fortinet W32/Filecoder_Cerber.B!tr
AVG FileRepMalware
Paloalto generic.ml

How to remove Win32/Kryptik.DROO?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

Zusy.546247 (file analysis)

The Zusy.546247 is considered dangerous by lots of security experts. When this infection is active,…

2 mins ago

About “Trojan:Win32/AgentTesla!rfn” infection

The Trojan:Win32/AgentTesla!rfn is considered dangerous by lots of security experts. When this infection is active,…

13 mins ago

What is “Trojan.Agent.DQLS”?

The Trojan.Agent.DQLS is considered dangerous by lots of security experts. When this infection is active,…

18 mins ago

What is “Backdoor:Win32/Rbot!F”?

The Backdoor:Win32/Rbot!F is considered dangerous by lots of security experts. When this infection is active,…

33 mins ago

Should I remove “Generic.Dacic.94CCEEA9.A.FF35E4E1”?

The Generic.Dacic.94CCEEA9.A.FF35E4E1 is considered dangerous by lots of security experts. When this infection is active,…

33 mins ago

Generic.Dacic.94CCEEA9.A.EE53247E removal tips

The Generic.Dacic.94CCEEA9.A.EE53247E is considered dangerous by lots of security experts. When this infection is active,…

38 mins ago