Malware

Win32:MalOb-DC [Cryp] removal guide

Malware Removal

The Win32:MalOb-DC [Cryp] is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32:MalOb-DC [Cryp] virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Win32:MalOb-DC [Cryp]?


File Info:

name: CCCD51CBDDA8D5420920.mlw
path: /opt/CAPEv2/storage/binaries/56b98f6741740dd19748f47b609243dbb65426bb4084108369d5600bb7375a0d
crc32: 019CF71D
md5: cccd51cbdda8d5420920c2ddcf83bf73
sha1: 9fc8e88190b7d4959759a1b8a25a7b60f2b8a07a
sha256: 56b98f6741740dd19748f47b609243dbb65426bb4084108369d5600bb7375a0d
sha512: fea6525a11560ceb0a2eb274602bc7bf077c9db86703832004a6fbd9a0f40c0806e9602f0afa5e71f0d0e84c558e2c0df0f3bd70189b86ca6847e5a68a1857f0
ssdeep: 3072:EQ2Tekyl+h2tRcay1uPBMTrv3rANIoA0DOqo0D6b:EQ2ck2chkJM/vsNIH0noV
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T117B3124071E123EBEB92D2B594F8968564FCA5305B32F587466F842243070DE5FBEB2C
sha3_384: 85b8d41fb817a7722fa7a9074f171c69ea321e55495ca13bc1f9935ffd0bd313610dc7c642ea67578b7afed1507ecb73
ep_bytes: 558bec81ec940000005357512b7de1e8
timestamp: 2010-09-08 16:54:27

Version Info:

0: [No Data]

Win32:MalOb-DC [Cryp] also known as:

BkavW32.AIDetectMalware
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Zbot.24
FireEyeGeneric.mg.cccd51cbdda8d542
CAT-QuickHealTrojan.Zbot.Y3
SkyhighBehavesLike.Win32.PinkSbot.cc
McAfeeGeneric PWS.lw.gen.a
Cylanceunsafe
ZillyaTrojan.SpyEyes.Win32.424
SangforSuspicious.Win32.Save.a
AlibabaTrojanPSW:Win32/Kryptik.c53a5eea
K7GWTrojan ( 001af76b1 )
K7AntiVirusTrojan ( 001af76b1 )
BitDefenderThetaGen:NN.ZexaF.36802.hmX@a83@zAki
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.BKMV
APEXMalicious
TrendMicro-HouseCallMal_Zbot-15
ClamAVWin.Trojan.Spyeyes-1776
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.Zbot.24
NANO-AntivirusTrojan.Win32.SpyEyes.dxjrem
AvastWin32:MalOb-DC [Cryp]
TencentWin32.Trojan.Generic.Wwhl
EmsisoftGen:Variant.Zbot.24 (B)
F-SecureTrojan.TR/Patched.Gen
DrWebTrojan.PWS.Panda.387
VIPREGen:Variant.Zbot.24
TrendMicroMal_Zbot-15
Trapminemalicious.high.ml.score
SophosMal/EncPk-ACO
SentinelOneStatic AI – Malicious PE
JiangminTrojanSpy.SpyEyes.ud
WebrootW32.Heuristic.Gen
GoogleDetected
AviraTR/Patched.Gen
VaristW32/Zbot.OXQZ-8664
Antiy-AVLTrojan/Win32.AGeneric
KingsoftWin32.Trojan.Generic.a
MicrosoftPWS:Win32/Zbot
XcitiumTrojWare.Win32.TrojanSpy.SpyEyes.B@2v53j3
ArcabitTrojan.Zbot.24
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataGen:Variant.Zbot.24
CynetMalicious (score: 100)
AhnLab-V3Spyware/Win32.Zbot.R1255
VBA32SScope.Trojan.FakeAV.01110
ALYacGen:Variant.Zbot.24
MAXmalware (ai score=100)
PandaTrj/Genetic.gen
RisingMalware.Banker!8.E93A (TFE:5:Y0xt7NFpuDI)
IkarusTrojan-Spy.Win32.SpyEyes
FortinetW32/Krypt.T!tr
AVGWin32:MalOb-DC [Cryp]
DeepInstinctMALICIOUS
alibabacloudTrojan:Win/Zbot

How to remove Win32:MalOb-DC [Cryp]?

Win32:MalOb-DC [Cryp] removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment