Malware

Win32/Kryptik.HMLA removal guide

Malware Removal

The Win32/Kryptik.HMLA is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.HMLA virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Attempts to connect to a dead IP:Port (3 unique times)
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • A process attempted to delay the analysis task.
  • A named pipe was used for inter-process communication
  • A process created a hidden window
  • Drops a binary and executes it
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Executed a process and injected code into it, probably while unpacking
  • Network activity contains more than one unique useragent.
  • Installs itself for autorun at Windows startup
  • Writes a potential ransom message to disk
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

Related domains:

z.whorecord.xyz
api.2ip.ua
a.tomx.xyz
securebiz.org
tbpws.top
dimonbk83.tumblr.com
ocsp.comodoca.com
ocsp.usertrust.com
ocsp.sectigo.com

How to determine Win32/Kryptik.HMLA?


File Info:

crc32: D7C5572D
md5: 13fec96def2063de84dab683ac68452f
name: 13FEC96DEF2063DE84DAB683AC68452F.mlw
sha1: e96d9d89cc46b73dd07577203d143c3d9780a3d7
sha256: 13b58ca7069be911b9da14d853d3bb2ae88a0b3a09f9c730588d5e7e97eded53
sha512: 903f4eb9df437528d390114451110adcd2f063d46971d297583bec15baa2c6fa2cd9543f90762552c346a419cb2ba5f5f1fd0c8074618d87f38262c8ac315818
ssdeep: 24576:RxboLCqce+nyFKrqUN12XVWoig7QZjike2:RMAe1F1UeXVWFgGe32
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Win32/Kryptik.HMLA also known as:

BkavW32.AIDetect.malware1
LionicTrojan.Win32.Chapak.4!c
Elasticmalicious (high confidence)
DrWebTrojan.Rootkit.22047
ClamAVWin.Packed.Mdeclass-9892577-0
CAT-QuickHealRansom.Stop.Z5
CylanceUnsafe
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (W)
K7GWTrojan ( 00581f861 )
K7AntiVirusTrojan ( 00581f861 )
CyrenW32/Kryptik.EYC.gen!Eldorado
SymantecRansom.Wannacry
ESET-NOD32a variant of Win32/Kryptik.HMLA
APEXMalicious
AvastWin32:PWSX-gen [Trj]
CynetMalicious (score: 100)
KasperskyHEUR:Trojan.Win32.Chapak.gen
BitDefenderTrojan.GenericKD.46962066
MicroWorld-eScanTrojan.GenericKD.46962066
Ad-AwareTrojan.GenericKD.46962066
SophosMal/Generic-S
BitDefenderThetaGen:NN.ZexaF.34142.0uW@aukTxcjO
McAfee-GW-EditionBehavesLike.Win32.Emotet.cc
FireEyeGeneric.mg.13fec96def2063de
EmsisoftTrojan.GenericKD.46962066 (B)
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_94%
KingsoftWin32.Troj.Undef.(kcloud)
MicrosoftTrojan:Win32/Tnega!ml
ZoneAlarmHEUR:Trojan.Win32.Chapak.gen
GDataWin32.Trojan-Ransom.STOP.S7VM4T
AhnLab-V3CoinMiner/Win.Glupteba.R441249
McAfeeRDN/Ransomware.Stop
MAXmalware (ai score=85)
VBA32BScope.Trojan.AET.281105
MalwarebytesTrojan.MalPack
PandaTrj/Genetic.gen
RisingTrojan.Kryptik!1.D975 (CLASSIC)
IkarusTrojan.Win32.Crypt
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/GenKryptik.HMKY!tr
AVGWin32:PWSX-gen [Trj]
Paloaltogeneric.ml

How to remove Win32/Kryptik.HMLA?

Win32/Kryptik.HMLA removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment