Malware

Win32/Kryptik.HCPB malicious file

Malware Removal

The Win32/Kryptik.HCPB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.HCPB virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Mimics the system’s user agent string for its own requests
  • A process attempted to delay the analysis task.
  • A named pipe was used for inter-process communication
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
  • A process created a hidden window
  • Drops a binary and executes it
  • Uses Windows utilities for basic functionality
  • Executed a process and injected code into it, probably while unpacking
  • A system process is generating network traffic likely as a result of process injection
  • Behavior consistent with a dropper attempting to download the next stage.
  • Installs itself for autorun at Windows startup
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Creates a copy of itself
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

www.ip-adress.com

How to determine Win32/Kryptik.HCPB?


File Info:

crc32: 59B1BE07
md5: 0bbae1024a309657d0fabc18f5e2be7b
name: 444444.png
sha1: d4cd53fbe1cee3bbc0a467bc242255f7a177972c
sha256: 2aa7ea1ab67db3eb7bb81de9f7765a1a1acd81acd025992358cf857047717883
sha512: 11791a4895d497f8cd026c6df09f86861534e3784b6e7c09dc9d3a5e879cf9c855ac1edd4d79e094392e74dfa557e3dd45000fbe7007d3a4dbbdfa1f3fb3a215
ssdeep: 6144:inJmMg/wjSpNuAsyMoMWZ1cek6TNdalyaeqXJI:inY4jSXHPnc76+yaJXJ
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Win32/Kryptik.HCPB also known as:

BkavW32.AIDetectVM.malware2
MicroWorld-eScanGen:Variant.Ulise.104282
FireEyeGeneric.mg.0bbae1024a309657
Qihoo-360HEUR/QVM20.1.7263.Malware.Gen
ALYacGen:Variant.Ulise.104282
CylanceUnsafe
BitDefenderGen:Variant.Ulise.104282
Cybereasonmalicious.be1cee
BitDefenderThetaGen:NN.ZexaF.34106.dkW@aeh0Iin
ClamAVWin.Dropper.Qakbot-7645197-0
GDataGen:Variant.Ulise.104282
KasperskyTrojan-Banker.Win32.Qbot.sdl
TencentMalware.Win32.Gencirc.10b9c1d6
Ad-AwareGen:Variant.Ulise.104282
SophosTroj/Qbot-FS
DrWebTrojan.Inject3.38066
Invinceaheuristic
SentinelOneDFI – Malicious PE
Trapminemalicious.high.ml.score
EmsisoftGen:Variant.Ulise.104282 (B)
APEXMalicious
WebrootW32.Trojan.Gen
Antiy-AVLTrojan/Win32.GenKryptik
Endgamemalicious (high confidence)
ArcabitTrojan.Ulise.D1975A
ZoneAlarmTrojan-Banker.Win32.Qbot.sdl
MicrosoftTrojan:Win32/Wacatac.D!ml
AhnLab-V3Malware/Win32.Generic.C4051130
Acronissuspicious
McAfeeW32/PinkSbot-GN!0BBAE1024A30
MAXmalware (ai score=88)
VBA32BScope.Trojan.Tiggre
MalwarebytesTrojan.Qbot
ESET-NOD32a variant of Win32/Kryptik.HCPB
RisingBackdoor.Qakbot!8.C7B (C64:YzY0Om6QVFQpAl9s)
FortinetW32/GenKryptik.EHFB!tr
AVGWin32:BankerX-gen [Trj]
AvastWin32:BankerX-gen [Trj]
CrowdStrikewin/malicious_confidence_100% (D)
MaxSecureTrojan.Malware.300983.susgen

How to remove Win32/Kryptik.HCPB?

Win32/Kryptik.HCPB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment