Malware

Win32/Kryptik.GTMY removal instruction

Malware Removal

The Win32/Kryptik.GTMY is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.GTMY virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Performs HTTP requests potentially not found in PCAP.
  • Enumerates running processes
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Steals private information from local Internet browsers
  • Attempts to modify proxy settings
  • Harvests cookies for information gathering
  • Collects information to fingerprint the system

How to determine Win32/Kryptik.GTMY?


File Info:

name: 73F5F0750F59890F1AAA.mlw
path: /opt/CAPEv2/storage/binaries/7522ea0ccbf52a3bc5aecf17ae3d3f6f616988f4091c380e1a60982f161248b3
crc32: A9DFDC8D
md5: 73f5f0750f59890f1aaa16fa9f4c72c0
sha1: 6350714a96df8fd1261d2a5710f116d9713650f9
sha256: 7522ea0ccbf52a3bc5aecf17ae3d3f6f616988f4091c380e1a60982f161248b3
sha512: 66c6a7ed5176718eda6c4fc4278076b9b82d4f9f44446c892915238817ae654c364596d1c68218be38ea673f744b1ea74e12cb55da57b4c726dcc3b3f8c22d87
ssdeep: 12288:GvEnDkWUjX7pTRJiziXiR4MUonUDtRtDfF57AM5T5:jnDkLX7FziYJztDh
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T114D4125272C48071C7972239C925CB754EAABCAD87221EFF1FF6257A2F247E0861171E
sha3_384: 52cd70b50467c8e14a87f7b6aa85d0181d8cfb2df4e9150a38ef98d6b4e80ad7cec62b43858c36cffef12b3681c66f9d
ep_bytes: e8d2230000e989feffff8bff558bec81
timestamp: 2018-05-04 21:17:50

Version Info:

InternalName: fyukfuyv.evi
LegalCopyright: Copyright (C) 2019, ghvhfkh
Translation: 0x0839 0x04c4

Win32/Kryptik.GTMY also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
CynetMalicious (score: 100)
FireEyeGeneric.mg.73f5f0750f59890f
CAT-QuickHealRansom.Stop.P5
ALYacTrojan.BRMon.Gen.4
CylanceUnsafe
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (W)
BitDefenderThetaGen:NN.ZexaF.34182.Ny0@aqSkXCm
CyrenW32/S-15f730e0!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.GTMY
TrendMicro-HouseCallTrojan.Win32.SODINOK.SM.hp
Paloaltogeneric.ml
KasperskyTrojan.Win32.Chapak.djol
BitDefenderTrojan.BRMon.Gen.4
MicroWorld-eScanTrojan.BRMon.Gen.4
AvastWin32:Malware-gen
EmsisoftTrojan.BRMon.Gen.4 (B)
TrendMicroTrojan.Win32.SODINOK.SM.hp
McAfee-GW-EditionBehavesLike.Win32.Generic.jh
SophosML/PE-A + Mal/GandCrab-G
APEXMalicious
AviraHEUR/AGEN.1121533
MAXmalware (ai score=86)
MicrosoftTrojan:Win32/Wacatac.B!ml
ZoneAlarmTrojan.Win32.Chapak.djol
GDataTrojan.BRMon.Gen.4
SentinelOneStatic AI – Malicious PE
AhnLab-V3Win-Trojan/MalPe34.Suspicious.X2029
McAfeeSodinokibi!73F5F0750F59
VBA32BScope.TrojanBanker.NeutrinoPOS
MalwarebytesTrojan.MalPack.GS.Generic
RisingMalware.Heuristic!ET#98% (RDMK:cmRtazrKdg3ooeypJnZDuxIQAz6S)
IkarusTrojan.Win32.Crypt
MaxSecureRansomeware.CRAB.gen
FortinetW32/GenKryptik.GTNE!tr
AVGWin32:Malware-gen
Cybereasonmalicious.50f598

How to remove Win32/Kryptik.GTMY?

Win32/Kryptik.GTMY removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment