The Win32/Kryptik.GYCN file is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.
What Win32/Kryptik.GYCN virus can do?
- Executable code extraction
- Creates RWX memory
- Possible date expiration check, exits too soon after checking local time
- Mimics the system’s user agent string for its own requests
- Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
- Drops a binary and executes it
- The binary likely contains encrypted or compressed data.
- Deletes its original binary from disk
- Attempts to remove evidence of file being downloaded from the Internet
- Attempts to repeatedly call a single API many times in order to delay analysis time
- Installs itself for autorun at Windows startup
- Creates a copy of itself
- Anomalous binary characteristics
How to determine Win32/Kryptik.GYCN?
General:
Operating System: Windows 7 / 8 / 8.1 / 10 Virus Name: malicious (high confidence)
File Info:
Name: WQ8vnNpnd.exe
Size: 190231
Type: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
MD5: 74f92b0dbd37fcf722da9b4d9aa97968
SHA1: 5e33ad4db9d1741469932e0e4c303b3d693a9642
SH256: 2ac381d02d914461facbc8ca239ad7034ce966c9f3e8d0df42df92efeafb9d31
Version Info:
[No Data]
Win32/Kryptik.GYCN also known as:
ALYac | Trojan.Agent.Emotet |
APEX | Malicious |
AVG | FileRepMalware |
Acronis | suspicious |
Ad-Aware | Trojan.GenericKD.41998152 |
AegisLab | Trojan.Win32.Malicious.4!c |
AhnLab-V3 | Trojan/Win32.Emotet.C3554119 |
Alibaba | Trojan:Win32/Emotet.b903ae4e |
Antiy-AVL | Trojan/Win32.Casur |
Arcabit | Trojan.Generic.D280D748 |
Avira | TR/AD.Emotet.drydw |
BitDefender | Trojan.GenericKD.41998152 |
BitDefenderTheta | Gen:NN.ZexaE.32250.lKX@a0q!Q5ki |
CrowdStrike | win/malicious_confidence_90% (W) |
Cybereason | malicious.db9d17 |
Cylance | Unsafe |
Cyren | W32/Emotet.AAT.gen!Eldorado |
DrWeb | Trojan.Emotet.762 |
ESET-NOD32 | a variant of Win32/Kryptik.GYCN |
Endgame | malicious (high confidence) |
F-Prot | W32/Emotet.AAT.gen!Eldorado |
F-Secure | Trojan.TR/AD.Emotet.drydw |
FireEye | Generic.mg.74f92b0dbd37fcf7 |
Fortinet | W32/TrickBot.4AE1!tr |
GData | Trojan.GenericKD.41998152 |
Ikarus | Trojan-Banker.Emotet |
Jiangmin | Trojan.Banker.Emotet.mej |
K7AntiVirus | Trojan ( 0055b1cb1 ) |
K7GW | Trojan ( 0055b1cb1 ) |
Kaspersky | HEUR:Trojan-Banker.Win32.Emotet.vho |
MAX | malware (ai score=89) |
Malwarebytes | Trojan.Emotet.Generic |
McAfee | Emotet-FOE!74F92B0DBD37 |
McAfee-GW-Edition | BehavesLike.Win32.Generic.ch |
MicroWorld-eScan | Trojan.GenericKD.41998152 |
Microsoft | Trojan:Win32/Emotet |
NANO-Antivirus | Trojan.Win32.Emotet.ggjxor |
Paloalto | generic.ml |
Panda | Trj/Genetic.gen |
Qihoo-360 | Win32/Trojan.e3a |
Rising | Trojan.Generic@ML.99 (RDML:gAVkMi5yDooMT3ozAxUsKQ) |
SentinelOne | DFI – Malicious PE |
Sophos | Mal/EncPk-APC |
Symantec | Trojan Horse |
Trapmine | malicious.moderate.ml.score |
TrendMicro | TROJ_GEN.R002C0DK819 |
TrendMicro-HouseCall | TROJ_GEN.R002C0DK819 |
VBA32 | Trojan.Emotet |
VIPRE | Trojan.Win32.Generic!BT |
ViRobot | Trojan.Win32.Z.Emotet.190231 |
Webroot | W32.Trojan.Emotet |
ZoneAlarm | HEUR:Trojan-Banker.Win32.Emotet.gen |
How to remove Win32/Kryptik.GYCN?
- Download and install GridinSoft Anti-Malware.
- Open GridinSoft Anti-Malware and perform a “Standard scan“.
- “Move to quarantine” all items.
- Open “Tools” tab – Press “Reset Browser Settings“.
- Select proper browser and options – Click “Reset”.
- Restart your computer.
Leave a Comment