Malware

Win32/Kryptik.GKLH removal

Malware Removal

The Win32/Kryptik.GKLH is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.GKLH virus can do?

  • Executable code extraction
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • Attempts to connect to a dead IP:Port (6 unique times)
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Exhibits possible ransomware file modification behavior
  • Creates a hidden or system file
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Appends a known encryptJJS ransomware file extension to files that have been encrypted

Related domains:

www.billerimpex.com
www.macartegrise.eu
www.poketeg.com
perovaphoto.ru
asl-company.ru
www.fabbfoundation.gm
www.perfectfunnelblueprint.com
www.wash-wear.com
pp-panda74.ru
cevent.net
bellytobabyphotographyseattle.com
alem.be
apps.identrust.com
crl.identrust.com
boatshowradio.com
dna-cp.com
acbt.fr
x1.c.lencr.org
r3.o.lencr.org
wpakademi.com
www.cakav.hu
www.mimid.cz
6chen.cn
goodapd.website
oceanlinen.com
tommarmores.com.br
nesten.dk
zaeba.co.uk
www.n2plus.co.th
koloritplus.ru
h5s.vn
marketisleri.com
www.toflyaviacao.com.br
www.rment.in
www.lagouttedelixir.com
www.krishnagrp.com
big-game-fishing-croatia.hr
ocsp.digicert.com

How to determine Win32/Kryptik.GKLH?


File Info:

crc32: DB94E4B7
md5: 52d42678d4f92d5b038ccfb69fc12294
name: 52D42678D4F92D5B038CCFB69FC12294.mlw
sha1: 5c26d2c2753399afa4b4c4d92f6994cd477fd3ff
sha256: b140906aba1a79777ca17fdd8295c5204ebc99e63d2f856742c4a243fcf4f96e
sha512: 864bc18b44a8e99837156287559356b0f47dd65e9e9b3b6228d10d9e8d2f6eeb3dba9973930a7a75bb99d6f8f8f04d4991e85e7d5f01a89f53fb875c93b92b3a
ssdeep: 24576:pdO/UzyASnm7oH8eZEZmk/LIJKPvyxb2EAgIFw5XWHPpjNyB9T3lFVs:pfy2mkMpImGRNW9TLVs
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright xa9. All rights reserved. Huimin
InternalName: Ontology
CompanyName: Huimin
ProductName: Ontology
ProductVersion: 6.2.8.5
FileDescription: Whos Collectors Brochures
OriginalFilename: Ontology.exe
Translation: 0x0409 0x04b0

Win32/Kryptik.GKLH also known as:

BkavW32.AIDetect.malware1
K7AntiVirusTrojan ( 0053d4e81 )
Elasticmalicious (high confidence)
DrWebTrojan.Encoder.25976
CynetMalicious (score: 100)
CylanceUnsafe
ZillyaTrojan.Crypren.Win32.658
SangforTrojan.Win32.Save.a
AlibabaRansom:Win32/Crypren.179951b0
K7GWTrojan ( 0053d4e81 )
SymantecDownloader
ESET-NOD32a variant of Win32/Kryptik.GKLH
APEXMalicious
AvastWin32:Trojan-gen
KasperskyTrojan-Ransom.Win32.Crypren.aesx
NANO-AntivirusTrojan.Win32.Crypren.fihjgd
TencentWin32.Trojan.Crypren.Swky
SophosMal/Generic-S
BitDefenderThetaGen:NN.ZexaF.34770.Mr0@aC9nR2ki
VIPREFraudTool.Win32.RogueSecurity (v)
McAfee-GW-EditionArtemis!Trojan
FireEyeGeneric.mg.52d42678d4f92d5b
JiangminTrojan.Crypren.mm
AviraHEUR/AGEN.1100819
eGambitUnsafe.AI_Score_57%
Antiy-AVLTrojan/Generic.ASMalwS.2822124
MicrosoftTrojan:Win32/Glupteba!ml
AegisLabTrojan.Win32.Crypren.4!c
McAfeeArtemis!52D42678D4F9
MAXmalware (ai score=78)
VBA32TrojanRansom.Crypren
PandaTrj/GdSda.A
YandexTrojan.Crypren!9+n9qCws/bI
IkarusTrojan.Crypt
FortinetW32/GandCrab.D!tr.ransom
AVGWin32:Trojan-gen
Paloaltogeneric.ml

How to remove Win32/Kryptik.GKLH?

Win32/Kryptik.GKLH removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment