Worm

What is “Worm:Win32/Ructo.J”?

Malware Removal

The Worm:Win32/Ructo.J is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Worm:Win32/Ructo.J virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Creates RWX memory
  • Attempts to connect to a dead IP:Port (13 unique times)
  • Reads data out of its own binary image
  • A process created a hidden window
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Uses Windows utilities for basic functionality
  • Executed a process and injected code into it, probably while unpacking
  • Creates a hidden or system file
  • Attempts to modify proxy settings

Related domains:

z.whorecord.xyz
a.tomx.xyz
www.youtube.com
www.bing.com
ocsp.pki.goog
i.ytimg.com
fonts.googleapis.com
fonts.gstatic.com
r2—sn-4g5ednsd.googlevideo.com
ssl.gstatic.com

How to determine Worm:Win32/Ructo.J?


File Info:

crc32: 7F670A3A
md5: 1d335a7d055b7dffc2baeac265f072d6
name: 1D335A7D055B7DFFC2BAEAC265F072D6.mlw
sha1: ab871b9769dacecf0fb4887eb706d97a551a3f9e
sha256: d107a1093a0a0d214a9af08e9e4f35708b17aaeb7b2d8dca85fa9f965239c580
sha512: 7c4bcc527cb1a8d04da324ac5e2f21b0ac8e2576d7c82054874b4733957b5af2bda60495c1e931d3c2f8b1190336679bb6386b69508484ae8a6532df0bd00228
ssdeep: 6144:sAFELV9WkhHnkpPlxhPG+hxHLjdw/4NzNXn85R7Iuyuy8wFto3MIqzEQB7x026V:sA6bf5Ud3rjdJzxVuy8WoyzEQBiK
type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed

Version Info:

CompiledScript: AutoIt v3 Script: 3, 3, 8, 1
FileVersion: 3, 3, 8, 1
FileDescription:
Translation: 0x0809 0x04b0

Worm:Win32/Ructo.J also known as:

BkavW32.AIDetectVM.malware1
MicroWorld-eScanTrojan.Autoit.AVI
FireEyeGeneric.mg.1d335a7d055b7dff
ALYacTrojan.Autoit.AVI
CylanceUnsafe
VIPRETrojan.Win32.Generic.pak!cobra
SangforMalware
K7AntiVirusTrojan ( 700000111 )
BitDefenderTrojan.Autoit.AVI
K7GWTrojan ( 700000111 )
Cybereasonmalicious.d055b7
CyrenW32/Backdoor.DFKL-4005
SymantecTrojan.Gen.MBT
TotalDefenseWin32/Ructo.BS
APEXMalicious
AvastAutoIt:Crypt-A [Drp]
ClamAVWin.Malware.Generic-6664531-0
KasperskyTrojan-Dropper.Win32.Injector.firi
AlibabaWorm:Win32/Ructo.5cebddbb
NANO-AntivirusTrojan.Win32.Inject.ujeui
Ad-AwareTrojan.Autoit.AVI
EmsisoftTrojan.Autoit.AVI (B)
ComodoMalware@#16ob41se55sb7
F-SecureTrojan.TR/Dropper.Gen
DrWebTrojan.FakeAV.11093
ZillyaWorm.AutoItGen.Win32.45
TrendMicroTROJ_GEN.R002C0CLL20
McAfee-GW-EditionBehavesLike.Win32.Spyware.gc
SophosTroj/Autoit-QC
IkarusTrojan-Dropper.Win32.Injector
WebrootW32.Trojan.Dropper
AviraTR/Dropper.Gen
MAXmalware (ai score=100)
KingsoftWin32.Troj.Injector.(kcloud)
MicrosoftWorm:Win32/Ructo.J
ArcabitTrojan.Autoit.AVI
ZoneAlarmTrojan-Dropper.Win32.Injector.firi
GDataTrojan.Autoit.AVI
CynetMalicious (score: 100)
McAfeeGeneric.dx!1D335A7D055B
MalwarebytesMalware.Heuristic.1003
PandaTrj/Injector.AV
ESET-NOD32multiple detections
TrendMicro-HouseCallTROJ_GEN.R002C0CLL20
TencentWin32.Trojan-Dropper.Injector.lbn
SentinelOneStatic AI – Suspicious PE
eGambitUnsafe.AI_Score_93%
FortinetW32/Injector.FIRI!tr
BitDefenderThetaAI:Packer.4ED90C6E19
AVGAutoIt:Crypt-A [Drp]
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_80% (W)
Qihoo-360HEUR/Malware.QVM11.Gen

How to remove Worm:Win32/Ructo.J?

Worm:Win32/Ructo.J removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment