Malware

Win32/Kryptik.HODX removal tips

Malware Removal

The Win32/Kryptik.HODX is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.HODX virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Creates RWX memory
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • Performs HTTP requests potentially not found in PCAP.
  • Unconventionial language used in binary resources: Macedonian
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Attempts to modify proxy settings

How to determine Win32/Kryptik.HODX?


File Info:

name: F6BC5259BCAF20AB7EA9.mlw
path: /opt/CAPEv2/storage/binaries/10889bac546a5174af8f13597f99cf4128e9efe3578afcc810b757bf108dfddd
crc32: A3D6060D
md5: f6bc5259bcaf20ab7ea989246cb66e64
sha1: f790dd5b06e7791e9e61fc4413afd5e463337959
sha256: 10889bac546a5174af8f13597f99cf4128e9efe3578afcc810b757bf108dfddd
sha512: 21c34ee824ec8270251cf573d68506100091d5f506e50b07974f6bb2d5b9d0cb1ce58de757b32153aa6e687033d6a2853df00393823d8c235ba5629371222d69
ssdeep: 3072:9Jd/dLn01/OJib7I7AiDMa5XrOX/Qxs6YT/fh4Z5+PFoJX:DdlL0BYK6YFB98
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T12B24BF1032E5C032D5A366BA8478C7F54A77BC652B36A98F7ED127B90F353D1DA2430A
sha3_384: f6c052681a2fa017957b5d2eebed883a931271141e64999b6fd2b72aea3ed23e498729433d40cce3dd0ddc4e2dbdff14
ep_bytes: e8cd430000e979feffff8bff558bec81
timestamp: 2021-04-02 13:06:11

Version Info:

FileVers: 65.51.36.16
ProductVersa: 7.50.25.71
InternalName: peatemas
LegalCopyrighd: sharmir
Translation: 0x0169 0x0300

Win32/Kryptik.HODX also known as:

BkavW32.AIDetect.malware1
LionicTrojan.Win32.Shellcode.3!c
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKDZ.83189
FireEyeGeneric.mg.f6bc5259bcaf20ab
MalwarebytesTrojan.MalPack.GS
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 0058d9ac1 )
BitDefenderTrojan.GenericKDZ.83189
K7GWTrojan ( 0058d9ac1 )
Cybereasonmalicious.b06e77
BitDefenderThetaGen:NN.ZexaF.34212.nq0@a0ZzuobG
CyrenW32/Kryptik.GDH.gen!Eldorado
SymantecPacked.Generic.620
ESET-NOD32a variant of Win32/Kryptik.HODX
APEXMalicious
Paloaltogeneric.ml
ClamAVWin.Malware.Generic-9937750-0
KasperskyHEUR:Backdoor.Win32.Tofsee.pef
RisingExploit.Shellcode!8.2A (CLOUD)
Ad-AwareTrojan.GenericKDZ.83189
EmsisoftTrojan.GenericKDZ.83189 (B)
DrWebTrojan.Siggen16.38275
TrendMicroTROJ_GEN.R002C0PAS22
McAfee-GW-EditionBehavesLike.Win32.Generic.dh
SophosML/PE-A
IkarusTrojan.Win32.Crypt
AviraTR/AD.GenSHCode.bffyn
MAXmalware (ai score=88)
Antiy-AVLTrojan/Generic.ASMalwS.3518C04
MicrosoftRansom:Win32/StopCrypt.PAS!MTB
SUPERAntiSpywareTrojan.Agent/Gen-Stealer
GDataTrojan.GenericKDZ.83189
CynetMalicious (score: 100)
AhnLab-V3Ransomware/Win.Stop.R468727
Acronissuspicious
ALYacTrojan.GenericKDZ.83189
VBA32Malware-Cryptor.2LA.gen
CylanceUnsafe
PandaTrj/GdSda.A
TrendMicro-HouseCallTROJ_GEN.R002C0PAS22
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.HODR!tr
AVGWin32:MalwareX-gen [Trj]
AvastWin32:MalwareX-gen [Trj]
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Win32/Kryptik.HODX?

Win32/Kryptik.HODX removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment