Malware

About “Win32/Kryptik.HAFS” infection

Malware Removal

The Win32/Kryptik.HAFS is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.HAFS virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Mimics the system’s user agent string for its own requests
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
  • Drops a binary and executes it
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Deletes its original binary from disk
  • Attempts to remove evidence of file being downloaded from the Internet
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Installs itself for autorun at Windows startup
  • Creates a copy of itself
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine Win32/Kryptik.HAFS?


File Info:

crc32: 520647E1
md5: 15ef2d23f1a2420cb3941778083307f7
name: wVpD2nLFNxt94zxvNTS.exe
sha1: 5f9fa8d445d3d59e067d07ee8df9a3e7227a8ca9
sha256: 0853b7f54ba3560d954681937785a1c86f123128d17cfadd8fc6a2f769ddb656
sha512: a03234a50aabd505d11c03cdb1ac32450f18aebd118fb1ad7e08a87d5ef72d731450dd71b8158284fa61b4fe4e2a8da72ead2111d075f60ed384e827a2093625
ssdeep: 6144:uK1TL+6Rexa9WSU/BV5qVqc03x60Dhm+kEuS6QoJx5XpJqn3BTZe87tbiS4:umZ9WSlk13xRDhoS8x5gBU8JiS4
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright (C) 2001
InternalName: WBP
FileVersion: 1, 0, 0, 1
ProductName: WBP Application
ProductVersion: 1, 0, 0, 1
FileDescription: WBP MFC Application
OriginalFilename: WBP.EXE
Translation: 0x0409 0x04b0

Win32/Kryptik.HAFS also known as:

DrWebTrojan.DownLoader32.47698
MicroWorld-eScanTrojan.GenericKD.42248040
FireEyeGeneric.mg.15ef2d23f1a2420c
CylanceUnsafe
K7AntiVirusRiskware ( 0040eff71 )
BitDefenderTrojan.GenericKD.42248040
K7GWRiskware ( 0040eff71 )
CrowdStrikewin/malicious_confidence_90% (W)
BitDefenderThetaGen:NN.ZexaF.34082.zq1@aKqZFqfi
F-ProtW32/Kryptik.AYJ.gen!Eldorado
SymantecTrojan Horse
APEXMalicious
AvastWin32:Malware-gen
GDataTrojan.GenericKD.42248040
KasperskyUDS:DangerousObject.Multi.Generic
AlibabaTrojan:Win32/starter.ali1000037
ViRobotTrojan.Win32.Emotet.424585
AegisLabTrojan.Win32.Generic.4!c
RisingTrojan.GenKryptik!8.AA55 (CLOUD)
Ad-AwareTrojan.GenericKD.42248040
SophosMal/Encpk-AOZ
TrendMicroTrojanSpy.Win32.EMOTET.THAAEBO
McAfee-GW-EditionBehavesLike.Win32.Ransomware.gh
Trapminesuspicious.low.ml.score
EmsisoftTrojan.Emotet (A)
IkarusTrojan-Banker.Emotet
CyrenW32/Kryptik.AYJ.gen!Eldorado
WebrootW32.Trojan.Emotet
AviraTR/AD.Emotet.iagde
Endgamemalicious (high confidence)
ZoneAlarmUDS:DangerousObject.Multi.Generic
MicrosoftTrojan:Win32/Emotet!rfn
AhnLab-V3Trojan/Win32.Emotet.C3889684
Acronissuspicious
McAfeeEmotet-FPC!15EF2D23F1A2
MAXmalware (ai score=89)
MalwarebytesTrojan.Emotet
PandaTrj/Emotet.A
ESET-NOD32a variant of Win32/Kryptik.HAFS
SentinelOneDFI – Suspicious PE
FortinetW32/TrickBot.CJ!tr
AVGWin32:Malware-gen
Cybereasonmalicious.445d3d
Paloaltogeneric.ml

How to remove Win32/Kryptik.HAFS?

Win32/Kryptik.HAFS removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment