Malware

Win32/Kryptik.HOAR (file analysis)

Malware Removal

The Win32/Kryptik.HOAR is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.HOAR virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Executed a command line with /C or /R argument to terminate command shell on completion which can be used to hide execution
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Dynamic (imported) function loading detected
  • Performs HTTP requests potentially not found in PCAP.
  • HTTPS urls from behavior.
  • Reads data out of its own binary image
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Uses Windows utilities for basic functionality
  • Behavioural detection: Injection (Process Hollowing)
  • Executed a process and injected code into it, probably while unpacking
  • Behavioural detection: Injection (inter-process)
  • A process attempted to delay the analysis task by a long amount of time.
  • Created a process from a suspicious location
  • Installs itself for autorun at Windows startup
  • Installs itself for autorun at Windows startup
  • A process sent information about the computer to a remote location.
  • Attempts to identify installed AV products by installation directory
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Uses suspicious command line tools or Windows utilities

How to determine Win32/Kryptik.HOAR?


File Info:

name: F8F303AE9E2AC43B99A3.mlw
path: /opt/CAPEv2/storage/binaries/cc108743e4e63f085b8c52702835be411ccd0d88461c7e8fd1a5828e63f1e88a
crc32: 0945E0B2
md5: f8f303ae9e2ac43b99a345a8980961a2
sha1: 68e90d14ab91cdcecc80278304416c60d93dcb18
sha256: cc108743e4e63f085b8c52702835be411ccd0d88461c7e8fd1a5828e63f1e88a
sha512: df4302a73c257b36b2f8cb49811bc5a6da838a3294636a27e42ccf43313178d5a4d3cd7a05fa1ec032d371e130934fadaae86fcd93b5fcca9da4dc155e2e7026
ssdeep: 24576:wJZCvbFaPeEX8X+ZjbXDX+Ljzqs9EyFFF:wJZGpKX8XK7Qys6
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T153B5F133B565ED33CC0702B2FF5E46676D82E8504B6E12E39BE4661A90360E5C6F3A53
sha3_384: b2582011795d3d07890bac14a3b4a1db9fcc7b9bc9d5b63714db38e54d607d7ace73e5357f18ababbad31220dc60c5d1
ep_bytes: e9d49e0100e9c1150200e949730200e9
timestamp: 2021-12-29 10:37:17

Version Info:

0: [No Data]

Win32/Kryptik.HOAR also known as:

BkavW32.AIDetect.malware1
LionicTrojan.Win32.Swizzor.kZ6h
Elasticmalicious (high confidence)
DrWebTrojan.Siggen16.35970
MicroWorld-eScanTrojan.GenericKD.38603787
FireEyeGeneric.mg.f8f303ae9e2ac43b
McAfeeGenericRXAA-AA!F8F303AE9E2A
CylanceUnsafe
ZillyaTrojan.Inject.Win32.317387
SangforTrojan.Win32.Deyma.cmk
K7AntiVirusTrojan ( 0058d3e01 )
K7GWTrojan ( 0058d3e01 )
Cybereasonmalicious.4ab91c
BitDefenderThetaGen:NN.ZexaCO.34232.owZ@aeBIsAo
CyrenW32/Kryptik.GFQ.gen!Eldorado
SymantecPacked.Generic.497
ESET-NOD32a variant of Win32/Kryptik.HOAR
APEXMalicious
Paloaltogeneric.ml
KasperskyTrojan-Downloader.Win32.Deyma.cmk
BitDefenderTrojan.GenericKD.38603787
AvastWin32:BotX-gen [Trj]
TencentMalware.Win32.Gencirc.10d0052d
Ad-AwareTrojan.GenericKD.38603787
SophosMal/Generic-S
ComodoMalware@#gc4eboop2rmr
TrendMicroTrojan.Win32.AMADEY.YXCBOZ
McAfee-GW-EditionBehavesLike.Win32.Generic.vt
EmsisoftTrojan.GenericKD.38603787 (B)
GDataTrojan.GenericKD.38603787
JiangminTrojan.PSW.Azorult.hvm
WebrootW32.Malware.Gen
AviraHEUR/AGEN.1240830
Antiy-AVLTrojan/Generic.ASMalwS.3510784
GridinsoftRansom.Win32.AzorUlt.sa
ArcabitTrojan.Generic.D24D0C0B
ViRobotTrojan.Win32.Z.Agent.2335840
MicrosoftTrojan:Win32/Tiggre!rfn
CynetMalicious (score: 100)
AhnLab-V3Infostealer/Win.CryptBot.C4923311
ALYacTrojan.GenericKD.38603787
MAXmalware (ai score=89)
VBA32BScope.TrojanDownloader.Deyma
MalwarebytesBackdoor.Agent
TrendMicro-HouseCallTrojan.Win32.AMADEY.YXCBOZ
RisingBackdoor.Mokes!1.CECE (CLOUD)
IkarusTrojan.SuspectCRC
FortinetPossibleThreat.MU
AVGWin32:BotX-gen [Trj]
PandaTrj/GdSda.A
CrowdStrikewin/malicious_confidence_100% (W)
MaxSecureTrojan.Malware.140054091.susgen

How to remove Win32/Kryptik.HOAR?

Win32/Kryptik.HOAR removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment