Malware

Win32/Kryptik.GJBG (file analysis)

Malware Removal

The Win32/Kryptik.GJBG is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.GJBG virus can do?

  • Executable code extraction
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • Queries information on disks, possibly for anti-virtualization
  • Behavior consistent with a dropper attempting to download the next stage.
  • Detects the presence of Wine emulator via registry key
  • Checks the version of Bios, possibly for anti-virtualization
  • Attempts to modify proxy settings
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz
static.43.47.69.159.clients.your-server.de

How to determine Win32/Kryptik.GJBG?


File Info:

crc32: 3E67A35D
md5: 7d9319ebf80617dfb881129898f95b55
name: 7D9319EBF80617DFB881129898F95B55.mlw
sha1: 9c7069ac1b23b462dd910c4109598e1dcf85de8d
sha256: 097a58c5230c8ba0b5144b9a65b10b19bcddbca79093b9db9ccebe23c3a6f476
sha512: 227482d9c8f39c28ce4ca24b07dd6fbb34f4ac276d94a9c0f0f0c6106a7de7f0f3a74a9663b2f4ad8cd7bb32c282092725ae167c07015f434d564a1a9b0daf98
ssdeep: 49152:JBWU9w/M4pBq85YDsPGct4SXaehVwKF42:JBWUibpBqDoPGct/ht42
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Win32/Kryptik.GJBG also known as:

K7AntiVirusTrojan ( 00537eb21 )
LionicTrojan.Win32.Ekstak.4!c
Elasticmalicious (high confidence)
DrWebTrojan.InstallCube.3557
CAT-QuickHealPUA.AgentPMF.S19884381
ALYacGen:Variant.Zusy.322613
CylanceUnsafe
ZillyaTrojan.GenericKD.Win32.132045
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_60% (D)
AlibabaTrojan:Win32/Katusha.b1654741
K7GWTrojan ( 00537eb21 )
Cybereasonmalicious.bf8061
CyrenW32/S-0c8e9629!Eldorado
SymantecPUA.ICLoader
ESET-NOD32a variant of Win32/Kryptik.GJBG
APEXMalicious
AvastWin32:ICLoader-X [Adw]
CynetMalicious (score: 100)
KasperskyHEUR:Packed.Win32.Katusha.gen
BitDefenderGen:Variant.Zusy.322613
NANO-AntivirusTrojan.Win32.Ekstak.ffojia
MicroWorld-eScanGen:Variant.Zusy.322613
TencentTrojan.Win32.Kryptik.gjbs
Ad-AwareGen:Variant.Zusy.322613
SophosMal/Generic-S + Troj/Agent-AZKB
ComodoApplication.Win32.ICLoader.GS@84429a
BitDefenderThetaGen:NN.ZexaF.34236.esW@aysEoboi
McAfee-GW-EditionBehavesLike.Win32.Dropper.vc
FireEyeGeneric.mg.7d9319ebf80617df
EmsisoftApplication.Generic (A)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Ekstak.mqd
AviraTR/ICLoader.Gen8
eGambitUnsafe.AI_Score_100%
Antiy-AVLTrojan/Generic.ASBOL.C50A
MicrosoftTrojan:Win32/Zpevdo!rfn
ArcabitTrojan.Zusy.D4EC35
ZoneAlarmHEUR:Packed.Win32.Katusha.gen
GDataWin32.Adware.ICLoader.D
TACHYONTrojan/W32.Ekstak.2166784.S
AhnLab-V3Malware/Win32.Generic.C2623966
Acronissuspicious
McAfeePacked-FHK!7D9319EBF806
MAXmalware (ai score=100)
VBA32Trojan.Ekstak
MalwarebytesAdware.ICLoader
PandaTrj/Genetic.gen
RisingTrojan.Kryptik!1.AA23 (CLASSIC)
YandexTrojan.GenAsa!CUtkjZ7TxHw
IkarusTrojan.Win32.Krypt
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/CoinMiner.GYQC!tr
AVGWin32:ICLoader-X [Adw]
Paloaltogeneric.ml

How to remove Win32/Kryptik.GJBG?

Win32/Kryptik.GJBG removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment