Malware

Win32/Kryptik.GFYA removal tips

Malware Removal

The Win32/Kryptik.GFYA is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.GFYA virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Reads data out of its own binary image
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Installs itself for autorun at Windows startup
  • Attempts to identify installed AV products by installation directory
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Creates a slightly modified copy of itself
  • Anomalous binary characteristics

Related domains:

ipv4bot.whatismyipaddress.com
ns1.corp-servers.ru
zonealarm.bit
ns2.corp-servers.ru
ransomware.bit

How to determine Win32/Kryptik.GFYA?


File Info:

crc32: 5E6D6579
md5: de1bce6990e04f1b7a4c0b61979c7d25
name: DE1BCE6990E04F1B7A4C0B61979C7D25.mlw
sha1: a486bfdf02a6d9bd9dbc493e74e8b74736ca613b
sha256: 4e671d4fb28c75c394c6abd2061828bc09c2db31effaf2e8afa11617f7fc017c
sha512: efa4e303395a905d3c4d3a1ee30b5c4c2030b337f01a2de474c34d7ee4a87891a6614e9ce10e3500a61fc43ff590fb30c40e5e99bf789a747ba7d580df71c1d9
ssdeep: 6144:N+i525Lew/LeksLqR1x/jiV6WdU5sPLOBM2XHK1qFH:Qi50TyksWrxi3LYX7H
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Win32/Kryptik.GFYA also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.Ransom.GandCrab.Gen.2
FireEyeGeneric.mg.de1bce6990e04f1b
CAT-QuickHealTrojan.Chapak.ZZ6
ALYacTrojan.Ransom.GandCrab.Gen.2
CylanceUnsafe
VIPRETrojan.Win32.Generic!BT
SangforWin.Packed.Gandcrab-6552923-4
K7AntiVirusTrojan ( 003e58dd1 )
BitDefenderTrojan.Ransom.GandCrab.Gen.2
K7GWTrojan ( 003e58dd1 )
CrowdStrikewin/malicious_confidence_100% (D)
CyrenW32/S-8d75423b!Eldorado
SymantecPacked.Generic.525
APEXMalicious
AvastWin32:Malware-gen
ClamAVWin.Packed.Gandcrab-6552923-4
KasperskyHEUR:Trojan.Win32.Generic
NANO-AntivirusTrojan.Win32.Chapak.fanmtc
ViRobotTrojan.Win32.GandCrab.Gen.A
RisingMalware.Strealer!8.1EF (CLOUD)
Ad-AwareTrojan.Ransom.GandCrab.Gen.2
EmsisoftTrojan.Ransom.GandCrab.Gen.2 (B)
ComodoTrojWare.Win32.Chapak.GF@7mc1zz
F-SecureHeuristic.HEUR/AGEN.1102756
DrWebTrojan.Encoder.24384
ZillyaTrojan.Coins.Win32.22
TrendMicroRansom_GANDCRAB.SMJS2
McAfee-GW-EditionBehavesLike.Win32.Generic.fc
SophosMal/Generic-R + Mal/Agent-AUL
IkarusTrojan-Ransom.GandCrab
JiangminTrojan.Banker.NeutrinoPOS.dx
AviraHEUR/AGEN.1102756
Antiy-AVLTrojan[Banker]/Win32.NeutrinoPOS
MicrosoftRansom:Win32/GandCrab!rfn
ArcabitTrojan.Ransom.GandCrab.Gen.2
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataTrojan.Ransom.GandCrab.Gen.2
CynetMalicious (score: 100)
AhnLab-V3Win-Trojan/Gandcrab.Exp
Acronissuspicious
McAfeeGenericRXEZ-SJ!DE1BCE6990E0
MAXmalware (ai score=100)
VBA32BScope.Trojan.Chapak
MalwarebytesTrojan.MalPack.GS
PandaTrj/Genetic.gen
ESET-NOD32a variant of Win32/Kryptik.GFYA
TrendMicro-HouseCallRansom_GANDCRAB.SMJS2
TencentMalware.Win32.Gencirc.10b25da4
YandexTrojan.PWS.Coins!4qCge6youto
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Agent.BFJ!tr
BitDefenderThetaGen:NN.ZexaF.34590.suX@a4hclgg
AVGWin32:Malware-gen
Paloaltogeneric.ml
Qihoo-360Win32/Trojan.94d

How to remove Win32/Kryptik.GFYA?

Win32/Kryptik.GFYA removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment