Malware

How to remove “Win32/Kryptik.ILK”?

Malware Removal

The Win32/Kryptik.ILK is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.ILK virus can do?

  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Mimics the system’s user agent string for its own requests
  • Possible date expiration check, exits too soon after checking local time
  • Anomalous file deletion behavior detected (10+)
  • Dynamic (imported) function loading detected
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Performs HTTP requests potentially not found in PCAP.
  • Starts servers listening on 0.0.0.0:38212, :0
  • Enumerates running processes
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • Unconventionial language used in binary resources: Russian
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Code injection with CreateRemoteThread in a remote process
  • Behavioural detection: Injection (inter-process)
  • Behavioural detection: Injection with CreateRemoteThread in a remote process
  • Tries to unhook or modify Windows functions monitored by Cuckoo
  • Steals private information from local Internet browsers
  • Collects and encrypts information about the computer likely to send to C2 server
  • Installs itself for autorun at Windows startup
  • Exhibits behavior characteristics of BlackRemote/BlackRAT RAT
  • Attempts to modify proxy settings
  • Attempts to modify browser security settings
  • Harvests credentials from local FTP client softwares
  • Collects information to fingerprint the system
  • Clears web history

How to determine Win32/Kryptik.ILK?


File Info:

name: 839DDC342F0305F75979.mlw
path: /opt/CAPEv2/storage/binaries/75d4bd4dedf2a41d89b513042c58dc1027b2ec413e6bd5f8ec1e823a4bdf3321
crc32: 221C6DA1
md5: 839ddc342f0305f75979a057265cbf09
sha1: b611ac0afd40fe1745d70bfff8433d139e2420a4
sha256: 75d4bd4dedf2a41d89b513042c58dc1027b2ec413e6bd5f8ec1e823a4bdf3321
sha512: 5ea4e5540b99303052c40caae541e3c4511f2fb6ac1d61805a886817aaf3c3289080fd73ffef9b822f28f5ab33dd560d12ae55b838418a3d4e18d493b6434f5c
ssdeep: 3072:VhESe9B4W0FEmB7l6N0TUkYkKDwuTKBaXwW5HfMVt22U4KaKuzH:VhESOiF/BJ3ewuUaXwW5/MttK27
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1BEE323778039F412F1DC7A341586BD8485ACAF81E29F7CA6082AADDBD067C3712D3A5C
sha3_384: b2870f5e15b7e4588c5a71e33c563fb412f24f88ea21320e5ffa36070be8f937e18cab78610e99fc2a46e6889b50a6de
ep_bytes: 60be001042008dbe0000feff57eb0b90
timestamp: 2007-11-15 01:36:53

Version Info:

0: [No Data]

Win32/Kryptik.ILK also known as:

BkavW32.AIDetect.malware2
LionicTrojan.Win32.Zbot.lijp
Elasticmalicious (high confidence)
CynetMalicious (score: 100)
FireEyeGeneric.mg.839ddc342f0305f7
CAT-QuickHealTrojanBNK.Zbot.mue
ALYacGen:Heur.VIZ.!e!.1
CylanceUnsafe
ZillyaTrojan.Kryptik.Win32.1208759
SangforTrojan.Win32.Kryptik.ILK
K7AntiVirusTrojan ( 005485311 )
AlibabaTrojanPSW:Win32/Kryptik.153cab7f
K7GWTrojan ( 005485311 )
Cybereasonmalicious.42f030
VirITTrojan.Win32.Generic.OGD
CyrenW32/Zbot.BA.gen!Eldorado
SymantecTrojan.Zbot
ESET-NOD32a variant of Win32/Kryptik.ILK
APEXMalicious
ClamAVWin.Trojan.Agent-501148
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Heur.VIZ.!e!.1
NANO-AntivirusTrojan.Win32.Zbot.bodqkn
MicroWorld-eScanGen:Heur.VIZ.!e!.1
TencentWin32.Trojan.Generic.Eadp
Ad-AwareGen:Heur.VIZ.!e!.1
EmsisoftGen:Heur.VIZ.!e!.1 (B)
ComodoTrojWare.Win32.TrojanSpy.Zbot.G@2tckk5
VIPREVirTool.Win32.Obfuscator.da!j (v)
TrendMicroTROJ_CRYPTR.SMAX
McAfee-GW-EditionBehavesLike.Win32.PWSZbot.cc
SophosML/PE-A + Mal/Agent-IE
IkarusTrojan-Spy.Win32.SpyEyes
GDataGen:Heur.VIZ.!e!.1
JiangminTrojan.Generic.dxecd
WebrootW32.Downloader.Gen
AviraTR/Crypt.XPACK.Gen
Antiy-AVLTrojan/Generic.ASMalwS.187C125
ZoneAlarmHEUR:Trojan.Win32.Generic
MicrosoftPWS:Win32/Zbot!ml
AhnLab-V3Trojan/Win32.FraudPack.R3415
Acronissuspicious
McAfeeArtemis!839DDC342F03
MAXmalware (ai score=100)
VBA32BScope.TrojanSpy.SpyEyes.3019
PandaGeneric Malware
TrendMicro-HouseCallTROJ_CRYPTR.SMAX
RisingTrojan.Kryptik!8.8 (CLOUD)
YandexTrojan.GenAsa!RteUaRochw4
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.7164915.susgen
FortinetW32/SpyEye.SK!tr
BitDefenderThetaAI:Packer.87CAC0CD1F
AVGWin32:Malware-gen
AvastWin32:Malware-gen
CrowdStrikewin/malicious_confidence_60% (D)

How to remove Win32/Kryptik.ILK?

Win32/Kryptik.ILK removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment