Malware

Win32/Kryptik.GLER (file analysis)

Malware Removal

The Win32/Kryptik.GLER is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.GLER virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Creates RWX memory
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • Queries information on disks, possibly for anti-virtualization
  • Detects the presence of Wine emulator via registry key
  • Checks the version of Bios, possibly for anti-virtualization
  • Attempts to modify proxy settings
  • Collects information to fingerprint the system

Related domains:

z.whorecord.xyz
a.tomx.xyz
static.16.249.201.195.clients.your-server.de

How to determine Win32/Kryptik.GLER?


File Info:

crc32: F4D2F948
md5: 4a2c12e908b08a3959b673675bd9e401
name: 4A2C12E908B08A3959B673675BD9E401.mlw
sha1: 767d27e18f36c33adf5f671797753227de7597b3
sha256: 60183f4680ce3ed71dba239072a22d64b490f6800d3188ad615d5a54c78d6c23
sha512: be07ddef3d1415ce9222e9694de42a3765d96708f3a1fa560db4cf9018f6356cc1527e30a967b78d9a42725e556fd538ee377bfbd98c35ddb8cebd76b2b1bc2e
ssdeep: 49152:DHe7q7hOmso3WjYhEbPGn4J1TeMVwKFoZUxZGoEdb:q7GOo36bPGnfMtsoEdb
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

InternalName: AJRepair.exe
FileDescription: ZX Components 4.63 installer
FileVersion: 15.1.1242.13
OriginalFilename: AJRepair.exe
ProductVersion: 15.1.1242.13
Translation: 0x0409 0x04b0

Win32/Kryptik.GLER also known as:

K7AntiVirusTrojan ( 0053e8521 )
LionicTrojan.Win32.Ekstak.4!c
Elasticmalicious (high confidence)
DrWebTrojan.InstallCube.3673
CynetMalicious (score: 100)
CAT-QuickHealTrojan.Ekstak.S3560696
ALYacGen:Variant.Kryptic.9
CylanceUnsafe
ZillyaTrojan.Ekstak.Win32.11145
SangforTrojan.Win32.Save.a
AlibabaTrojan:Win32/Ekstak.e766da02
K7GWTrojan ( 0053e8521 )
Cybereasonmalicious.908b08
CyrenW32/ICloader.BR.gen!Eldorado
SymantecPUA.ICLoader
ESET-NOD32a variant of Win32/Kryptik.GLER
APEXMalicious
AvastWin32:ICLoader-X [Adw]
KasperskyTrojan.Win32.Ekstak.jgqk
BitDefenderGen:Variant.Kryptic.9
NANO-AntivirusTrojan.Win32.InstallCube.fijysg
MicroWorld-eScanGen:Variant.Kryptic.9
TencentWin32.Trojan.Ekstak.Pcjc
Ad-AwareGen:Variant.Kryptic.9
SophosMal/Generic-S
ComodoApplication.Win32.ICLoader.GS@84429a
BitDefenderThetaGen:NN.ZexaF.34236.Os0@aGrqN9ai
McAfee-GW-EditionBehavesLike.Win32.Generic.vc
FireEyeGeneric.mg.4a2c12e908b08a39
EmsisoftGen:Variant.Kryptic.9 (B)
SentinelOneStatic AI – Malicious PE
JiangminAdWare.ICLoader.kxo
AviraTR/ICLoader.Gen8
eGambitUnsafe.AI_Score_99%
Antiy-AVLTrojan/Generic.ASMalwS.28291F2
MicrosoftPWS:Win32/Zbot!ml
GDataGen:Variant.Kryptic.9
TACHYONTrojan/W32.Ekstak.2760704
AhnLab-V3PUP/Win32.ICLoader.R238310
Acronissuspicious
McAfeePacked-FME!4A2C12E908B0
MAXmalware (ai score=100)
VBA32BScope.Trojan.InstallCube
MalwarebytesAdware.ICLoader.Generic
PandaTrj/Genetic.gen
RisingTrojan.Kryptik!1.AA23 (CLASSIC)
YandexTrojan.GenAsa!9tj5vKrMzRs
IkarusPUA.ICLoader
FortinetW32/CoinMiner.GYQC!tr
AVGWin32:ICLoader-X [Adw]
Paloaltogeneric.ml

How to remove Win32/Kryptik.GLER?

Win32/Kryptik.GLER removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment