Malware

Win32/Kryptik.HATU removal tips

Malware Removal

The Win32/Kryptik.HATU is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.HATU virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Scheduled file move on reboot detected
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Enumerates running processes
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Steals private information from local Internet browsers
  • Likely virus infection of existing system binary

Related domains:

interestourflash.info

How to determine Win32/Kryptik.HATU?


File Info:

name: 8005CF919E5C8950B9E3.mlw
path: /opt/CAPEv2/storage/binaries/ed88f5d97df26ef4a855d18c4dcb592d6b095495efd1183d28d425372b03a909
crc32: A9A88C6F
md5: 8005cf919e5c8950b9e3884510f3b2f3
sha1: bb63abee2057a438aa4bd0904e781f9067f820d7
sha256: ed88f5d97df26ef4a855d18c4dcb592d6b095495efd1183d28d425372b03a909
sha512: ae7f8c1949926db83b1cbec91e950d6733dae2c26a4ea77723d26cf3ffb8213407ba5681777010d843ca5dcbab0d04b7122de9c738ca03dc95712be25b557129
ssdeep: 49152:X+MWoEBdOPnFJxoJhBqG0qZ6E6KfKj6g92sMe/w:jWH+NJxKB30q7C6O2sM
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T154B5AE0F972EDBE6C6036038187A33E52BC5E96CD79D17A3AE626D3B32D40C255B5384
sha3_384: 43f070269c93db6e553c18f7dfc7d9ad29c34cead2dd69f0774f8ec69f6b5056ff1167b4aacb85120ec061b520c1d34c
ep_bytes: 558bec6aff681077570068a850570064
timestamp: 2021-11-17 05:21:12

Version Info:

0: [No Data]

Win32/Kryptik.HATU also known as:

LionicTrojan.Win32.Injuke.4!c
Elasticmalicious (high confidence)
DrWebTrojan.Siggen15.50502
MicroWorld-eScanGen:Variant.Ulise.322660
FireEyeGeneric.mg.8005cf919e5c8950
ALYacGen:Variant.Ulise.322660
CylanceUnsafe
K7AntiVirusTrojan ( 005823bf1 )
AlibabaTrojan:Win32/Injuke.285f0e69
K7GWTrojan ( 005823bf1 )
Cybereasonmalicious.e2057a
BitDefenderThetaGen:NN.ZexaCO.34294.oEW@airUJlob
CyrenW32/FakeAlert.FY.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.HATU
TrendMicro-HouseCallTROJ_GEN.R002C0WKM21
Paloaltogeneric.ml
KasperskyHEUR:Trojan.Win32.Injuke.gen
BitDefenderGen:Variant.Ulise.322660
AvastWin32:Trojan-gen
Ad-AwareGen:Variant.Ulise.322660
SophosMal/Generic-S
TrendMicroTROJ_GEN.R002C0WKM21
McAfee-GW-EditionBehavesLike.Win32.MultiDropper.vc
EmsisoftGen:Variant.Ulise.322660 (B)
IkarusTrojan.Win32.Crypt
JiangminTrojan.Injuke.mno
AviraTR/Crypt.Agent.pujpl
MAXmalware (ai score=88)
GridinsoftRansom.Win32.Sabsik.sa
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
GDataWin32.Trojan.PSE.1QRPSAL
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win.Generic.C4780019
McAfeeGenericRXQU-PK!8005CF919E5C
APEXMalicious
RisingTrojan.Generic@ML.88 (RDMK:9FMCsdP68zoS0UnhJMstAA)
YandexTrojan.Injuke!FjS89GnQ/QM
SentinelOneStatic AI – Malicious PE
FortinetW32/Kryptik.HATU!tr
AVGWin32:Trojan-gen
PandaTrj/GdSda.A
CrowdStrikewin/malicious_confidence_70% (W)

How to remove Win32/Kryptik.HATU?

Win32/Kryptik.HATU removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment