Malware

How to remove “Win32/Kryptik.GJRL”?

Malware Removal

The Win32/Kryptik.GJRL is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.GJRL virus can do?

  • Executable code extraction
  • Reads data out of its own binary image
  • Performs some HTTP requests
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • Looks up the external IP address
  • Queries information on disks, possibly for anti-virtualization
  • Network activity contains more than one unique useragent.
  • Collects information about installed applications
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Generates some ICMP traffic
  • Anomalous binary characteristics

Related domains:

www.360.cn
icanhazip.com

How to determine Win32/Kryptik.GJRL?


File Info:

crc32: 51C51DBA
md5: 4db93ab82a30be35e3854975f47f1054
name: 4DB93AB82A30BE35E3854975F47F1054.mlw
sha1: 4b3417ebefa9ce783046f638d9027a8686fd57c6
sha256: b0faf6f671311d647d4e2b9f4a0d85669a8c55e299c1bc15f20d2cc261e88bf2
sha512: 87c2b9b7489a5ee1c703617ca86dc260af52984a22b12b5a6761d49d1fa7d47b01e6d479756ccae5fda957ad917b05fadbdb08e73aab82217d84a1b22e455077
ssdeep: 6144:jKmMLM+tBRbvy79DdqOq9HMfEFkrbgisiN:cgIBRbvy5Dd+5Sfg
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: x7248x6743x6240x6709 (C) 2018
InternalName: RunResDll
FileVersion: 1, 0, 0, 1
CompanyName:
LegalTrademarks:
ProductName: RunResDll x5e94x7528x7a0bx5e8f
ProductVersion: 1, 0, 0, 1
FileDescription: RunResDll Microsoft x57fax7840x7c7bx5e94x7528x7a0bx5e8f
OriginalFilename: RunResDll.EXE
Translation: 0x0804 0x04b0

Win32/Kryptik.GJRL also known as:

K7AntiVirusTrojan ( 0054e0a31 )
Elasticmalicious (high confidence)
DrWebTrojan.PWS.Siggen2.3725
CynetMalicious (score: 100)
CAT-QuickHealTrojan.GenericRI.S23839443
ALYacGen:Variant.Strictor.264540
CylanceUnsafe
CrowdStrikewin/malicious_confidence_80% (D)
K7GWTrojan ( 0054e0a31 )
Cybereasonmalicious.82a30b
CyrenW32/Zusy.CW.gen!Eldorado
ESET-NOD32a variant of Win32/Kryptik.GJRL
APEXMalicious
AvastWin32:Trojan-gen
KasperskyTrojan.Win32.Agent.qwidcl
BitDefenderGen:Variant.Strictor.264540
MicroWorld-eScanGen:Variant.Strictor.264540
TencentMalware.Win32.Gencirc.10b1fe67
Ad-AwareGen:Variant.Strictor.264540
SophosML/PE-A
ComodoWorm.Win32.Prux.A@4q442u
BitDefenderThetaGen:NN.ZexaF.34266.yq0@aeatDvbb
McAfee-GW-EditionTrojan-FPZA!4DB93AB82A30
FireEyeGeneric.mg.4db93ab82a30be35
EmsisoftGen:Variant.Strictor.264540 (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Agent.bwin
AviraHEUR/AGEN.1111322
Antiy-AVLTrojan/Generic.ASMalwS.26900A4
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
ArcabitTrojan.Strictor.D4095C
ZoneAlarmTrojan.Win32.Agent.qwidcl
GDataGen:Variant.Strictor.264540
TACHYONTrojan/W32.Agent.393216.AQA
AhnLab-V3Trojan/Win.Generic.R419093
Acronissuspicious
McAfeeTrojan-FPZA!4DB93AB82A30
MAXmalware (ai score=89)
VBA32Trojan.Fuerboos
MalwarebytesTrojan.Crypt
PandaTrj/GdSda.A
RisingTrojan.Generic@ML.90 (RDML:Azrldlgy2GcQGBv9DFgGrA)
YandexTrojan.GenAsa!wOfcMPeEaoo
IkarusTrojan.Crypt
FortinetW32/Kryptik.GHFL!tr
AVGWin32:Trojan-gen

How to remove Win32/Kryptik.GJRL?

Win32/Kryptik.GJRL removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment