Malware

Win32/Kryptik.HILM malicious file

Malware Removal

The Win32/Kryptik.HILM is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.HILM virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (3 unique times)
  • Creates RWX memory
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Performs some HTTP requests
  • Unconventionial language used in binary resources: Ukrainian
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Checks for the presence of known windows from debuggers and forensic tools
  • Installs itself for autorun at Windows startup
  • Attempts to identify installed AV products by installation directory
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Detects VirtualBox through the presence of a registry key
  • Anomalous binary characteristics

Related domains:

iplogger.org
leatherbond.top
ip-api.com

How to determine Win32/Kryptik.HILM?


File Info:

crc32: B5B8FEA2
md5: c2114030f9c5daed9908ef1f03b0e4cc
name: C2114030F9C5DAED9908EF1F03B0E4CC.mlw
sha1: 2c49f939664f25ff3b64d49e0834703506512498
sha256: a1b2dcb716986db2c35442b9000b083179db31d4088244dbb39ce90665bdff15
sha512: ecfd4253fd6ae7cd92cd9bdfc7768ffcdaea11f8b1d9fd98ec5c7ff46c400647868942b5e9ce354375214f9335094aa82df743c6ffb38cc64ee55a897a294698
ssdeep: 12288:ucVw4Au0z/GI2IGQRRCN60DLJXvu39doU7kw37GNgbnf:O1uW27WRv0D9vu3zo+SKjf
type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed

Version Info:

InternalSurname: debaukd.ekze
Product: 1.7.7
FileVersions: 1.0.5.6
LegalCo: Copyri (C) 2019, permudationz

Win32/Kryptik.HILM also known as:

Elasticmalicious (high confidence)
DrWebTrojan.MulDrop16.3346
MicroWorld-eScanTrojan.GenericKD.45212592
FireEyeGeneric.mg.c2114030f9c5daed
Qihoo-360Win32/Trojan.Spy.a7f
CylanceUnsafe
SangforMalware
K7AntiVirusTrojan ( 005755cb1 )
BitDefenderTrojan.GenericKD.45212592
K7GWTrojan ( 005755cb1 )
CyrenW32/Kryptik.CVF.gen!Eldorado
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastWin32:DropperX-gen [Drp]
KasperskyTrojan-Spy.Win32.Stealer.vqi
AlibabaTrojanSpy:Win32/Stealer.e272596e
RisingBackdoor.Agent!8.C5D (TFE:5:IhzqwXEXQUL)
Ad-AwareTrojan.GenericKD.45212592
EmsisoftTrojan.GenericKD.45212592 (B)
ComodoMalware@#1ff3bxkbbh2es
F-SecureTrojan.TR/AD.AHKInfoSteal.ssaww
McAfee-GW-EditionBehavesLike.Win32.Trojan.hc
SophosMal/Generic-S
IkarusTrojan.SuspectCRC
JiangminTrojan.Agent.dbjb
WebrootW32.Trojan.Gen
AviraTR/AD.AHKInfoSteal.ssaww
Antiy-AVLTrojan/Win32.Kryptik
KingsoftWin32.Troj.Undef.(kcloud)
MicrosoftTrojan:Win32/Zenpack.MT!MTB
GridinsoftTrojan.Win32.Kryptik.oa
ArcabitTrojan.Generic.D2B1E3B0
ZoneAlarmTrojan-Spy.Win32.Stealer.vqi
GDataTrojan.GenericKD.45212592
CynetMalicious (score: 100)
AhnLab-V3Malware/Win32.RL_Generic.R361128
Acronissuspicious
McAfeeGenericRXAA-AA!C2114030F9C5
MAXmalware (ai score=89)
VBA32Trojan.Agent
MalwarebytesTrojan.MalPack.GS
PandaTrj/Genetic.gen
ESET-NOD32a variant of Win32/Kryptik.HILM
TencentWin32.Trojan-spy.Stealer.Sumz
YandexTrojanSpy.Stealer!wAsTGIrK0IY
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_79%
FortinetW32/Kryptik.HGHW!tr
AVGWin32:DropperX-gen [Drp]
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Win32/Kryptik.HILM?

Win32/Kryptik.HILM removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment