Malware

Win32/Kryptik.GBFA information

Malware Removal

The Win32/Kryptik.GBFA is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.GBFA virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Attempts to connect to a dead IP:Port (4 unique times)
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
  • Performs some HTTP requests
  • Attempts to remove evidence of file being downloaded from the Internet
  • Detects Sandboxie through the presence of a library
  • Executed a process and injected code into it, probably while unpacking
  • A system process is generating network traffic likely as a result of process injection
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • Checks the presence of disk drives in the registry, possibly for anti-virtualization
  • Creates a copy of itself

Related domains:

z.whorecord.xyz
a.tomx.xyz
www.bing.com
www.adobe.com
msdhcp.tk
msdhcp.ml

How to determine Win32/Kryptik.GBFA?


File Info:

crc32: CFF4B45D
md5: 4c7d8f4c5664627eabadd1e06484dc46
name: 4C7D8F4C5664627EABADD1E06484DC46.mlw
sha1: b520982aaeac754695fc42d7a9accb4168708376
sha256: 57e12073253d16961ae44d2ca2dbe5bea7620b108cb8fb52183655735fb7c42c
sha512: b8bd6c1d69297bd75bd73d96d1ce1a677f1494170b018ef5a61094293cbfaaa0039e09f4c8cf3c060bb113a1f44e132235665b448810e252ae46d14430e5af84
ssdeep: 6144:crm0hY9baDJJKry6Bz13DGzTBzCacyV+lam+:crm0C9GDJsjV13+VzCb3lad
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright (C) 2017
FileVersion: 1.0.0.1
ProductVersion: 1.0.0.1
Translation: 0x0809 0x04b0

Win32/Kryptik.GBFA also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
DrWebTrojan.MulDrop7.57479
CAT-QuickHealTrojan.Chapak.ZZ5
ALYacTrojan.BRMon.Gen.3
CylanceUnsafe
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_80% (D)
K7GWTrojan ( 0053305e1 )
K7AntiVirusTrojan ( 0053305e1 )
CyrenW32/S-72038380!Eldorado
SymantecPacked.Generic.525
ESET-NOD32a variant of Win32/Kryptik.GBFA
APEXMalicious
AvastWin32:Malware-gen
CynetMalicious (score: 100)
BitDefenderTrojan.BRMon.Gen.3
NANO-AntivirusTrojan.Win32.Kryptik.ewyetx
MicroWorld-eScanTrojan.BRMon.Gen.3
TencentMalware.Win32.Gencirc.11491b55
Ad-AwareTrojan.BRMon.Gen.3
SophosMal/Generic-S
ComodoTrojWare.Win32.Kirts.C@7jnerg
BitDefenderThetaGen:NN.ZexaF.34796.ou0@aCE8Dnpi
VIPRETrojan.Win32.Generic!BT
TrendMicroTSPY_EMOTET.SMD3
McAfee-GW-EditionBehavesLike.Win32.Generic.dh
FireEyeGeneric.mg.4c7d8f4c5664627e
EmsisoftTrojan.BRMon.Gen.3 (B)
JiangminBackdoor.Androm.wgk
AviraHEUR/AGEN.1102735
Antiy-AVLTrojan/Generic.ASMalwS.23DC714
MicrosoftRansom:Win32/Gandcrab.SF!MTB
GDataTrojan.BRMon.Gen.3
AhnLab-V3Trojan/Win32.RansomCrypt.R220586
McAfeeTrojan-FOSS!4C7D8F4C5664
MAXmalware (ai score=95)
VBA32BScope.Trojan.MulDrop
MalwarebytesTrojan.PasswordStealer
PandaTrj/CI.A
TrendMicro-HouseCallTSPY_EMOTET.SMD3
RisingMalware.Obscure/Heur!1.A89E (CLASSIC)
YandexTrojan.GenAsa!jlaQiw5I+sI
IkarusTrojan-Banker.UrSnif
FortinetW32/Kryptik.GBFP!tr
AVGWin32:Malware-gen
Paloaltogeneric.ml
Qihoo-360Win32/Ransom.GandCrab.HwoCEpsA

How to remove Win32/Kryptik.GBFA?

Win32/Kryptik.GBFA removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment