FacebookTwitterLinkedIn

How to eliminate Valak malware from your computer

Also Known As: Valak virus
Type: Trojan
Damage level: Severe

What is Valak?

Valak is malicious software that downloads JScript files and executes them. What happens next depends on the actions performed by the executed JScript files. It is very likely that cyber criminals behind Valak attempt to use this malware to cause chain infections (i.e., using Valak to distribute other malware).

Research shows that Valak is distributed through spam campaigns, however, in some cases, it infiltrates systems when they are already infected with malicious program such as Ursnif (also known as Gozi).

Valak malware

JScript files that are executed on infected machines through Valak might install other malicious (or even legitimate) software. Cyber criminals often use malware like Valak to infect systems with ransomware, cryptocurrency miners, remote access Trojans (RATs) or other Trojans (e.g. information stealers), etc.

Ransomware encrypts files and generates ransom messages. This malware prevents victims from accessing their files and forces them to purchase decryption software and/or keys. Cryptocurrency miners are programs that use computer hardware (such as the CPU, GPU) to mine cryptocurrency by solving mathematical problems.

In summary, cyber criminals employ infected computers to mine cryptocurrency for their own benefit. Infected computers consume more electricity and operate at reduced capacity (or do not respond at all). Mining processes can also cause hardware overheating, unexpected shutdowns (that could lead to loss of unsaved data), and other issues.

RATs are programs that allow cyber criminals to control infected machines remotely. Usually, software of this type is used to download and execute other (often malicious) files, access the microphone and webcam, log keystrokes, take screenshots, record the screen, and perform other such tasks.

In most cases, RATs are used to infect systems with other malware or steal sensitive information, which can then be misused to generate revenue. Information stealers are malicious programs that collect personal, confidential data. For example, login credentials, credit card details, data from various messaging apps, and other information of this kind.

A computer infected with Valak is therefore likely to become infected with other malware, thereby leading to other serious problems. For example, users might become victims of identity theft, suffer monetary loss, lose important data, lose access to personal accounts, experience problems relating browsing safety, online privacy, etc.

Threat Summary:
Name Valak virus
Threat Type Trojan, password-stealing virus, banking malware, spyware.
Detection Names (Si.exe) AVG (FileRepMalware), BitDefender (Trojan.GenericKD.32840092), ESET-NOD32 (A Variant Of Win32/GenKryptik.EARL), Kaspersky (Trojan.MSIL.VBSMeter.c), Full List (VirusTotal).
Malicious Process Name(s) Rreedid Evenin (its name might vary).
Payload Valak downloads and executes JScript, which can then distribute/install other malware.
Symptoms Trojans are designed to stealthily infiltrate the victim's computer and remain silent, and thus no particular symptoms are clearly visible on an infected machine.
Distribution methods Ursnif (also known as Gozi), Infected email attachments, malicious online advertisements, social engineering, software 'cracks'.
Damage Stolen passwords and banking information, identity theft, the victim's computer added to a botnet.
Malware Removal (Windows)

To eliminate possible malware infections, scan your computer with legitimate antivirus software. Our security researchers recommend using Combo Cleaner.
▼ Download Combo Cleaner
To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.

More examples of malware that share similarities with Valak include HimeraLoader, AbSent-Loader and sLoad. Commonly, programs of this type are used to spread other malware. As mentioned, Valak can achieve this by executing downloaded JScript files.

Typically, users install malicious software inadvertently when they are deceived. In any case, if Valak or other malware is installed on the computer, eliminate it immediately.

How did Valak infiltrate my computer?

Research shows that cyber criminals attempt to infect computers with Valak through spam campaigns. They send emails that contain malicious Microsoft Office documents and try to deceive recipients into opening them. When opened with MS Office version 2010 or later, the documents demand permission to enable content (macros commands).

If allowed, they then infiltrate Valak malware. Note that MS Office versions developed before 2010 do not include this 'Protected View' mode, and thus malicious documents opened with them infect systems immediately without asking any permissions.

Additionally, in some cases, Valak is installed on computers through Gozi (a.k.a. Ursnif ), other malicious program, however, this happens only when the computer is already infected with another malicious program.

How to avoid installation of malware

Do not download or install software through third party downloaders, installers, from unofficial web sites, Peer-to-Peer networks (e.g., torrent clients, eMule), free file hosting pages, or other channels of this kind. Commonly, such channels are used to distribute malware.

All software should be downloaded from official websites and via direct download links. Furthermore, installed software must be updated via implemented functions/tools that are designed by official developers. Do not open attachments or web links in irrelevant emails that are received from unknown, suspicious addresses.

Software should NEVER be activated through unofficial activation ('cracking') tools - this is illegal and often causes installation of high-risk malware. Regularly scan the computer for threats with reputable anti-spyware or antivirus software and keep the program up to date.

If you believe that your computer is already infected, we recommend running a scan with Combo Cleaner Antivirus for Windows to automatically eliminate infiltrated malware.

Malicious attachment distributing Valak ("NISSAN.doc"):

valak malware malicious nissan.doc document

Another attachment distributing Valak ("files 04.28.2020.doc"):

valak malware malicious files 04.28.2020.doc document 

Malicious Valak process running in Task Manager as "Treedid Evenin" (its name might vary):

valak malware treedid evenin malicious proccess in task manager

Yet another malicious MS Word document ("Datei_05.26.2020.doc") designed to spread Valak Trojan:

Valak trojan-spreading MS Word document (Datei_05.26.2020.doc)

Update 10 June 2020 - Cyber criminals have recently updated Valak malware, which is now capable of stealing Microsoft Outlook login credentials. Being able to gain access to victims' emails, cyber criminals can easily steal many accounts on various websites, social networks, and so on using the 'password recovery' feature.

This can eventually lead to actual identity theft, since criminals can easily misuse the account(s) to generate revenue by purchasing items, asking colleagues/friends to lend money, stealing business emails, etc.

Instant automatic malware removal: Manual threat removal might be a lengthy and complicated process that requires advanced IT skills. Combo Cleaner is a professional automatic malware removal tool that is recommended to get rid of malware. Download it by clicking the button below:
▼ DOWNLOAD Combo Cleaner By downloading any software listed on this website you agree to our Privacy Policy and Terms of Use. To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.

Quick menu:

How to remove malware manually?

Manual malware removal is a complicated task - usually it is best to allow antivirus or anti-malware programs to do this automatically.

To remove this malware we recommend using Combo Cleaner Antivirus for Windows. If you wish to remove malware manually, the first step is to identify the name of the malware that you are trying to remove. Here is an example of a suspicious program running on a user's computer:

malicious process running on user's computer sample

If you checked the list of programs running on your computer, for example, using task manager, and identified a program that looks suspicious, you should continue with these steps:

manual malware removal step 1Download a program called Autoruns. This program shows auto-start applications, Registry, and file system locations:

screenshot of autoruns application

manual malware removal step 2Restart your computer into Safe Mode:

Windows XP and Windows 7 users: Start your computer in Safe Mode. Click Start, click Shut Down, click Restart, click OK. During your computer start process, press the F8 key on your keyboard multiple times until you see the Windows Advanced Option menu, and then select Safe Mode with Networking from the list.

Safe Mode with Networking

Video showing how to start Windows 7 in "Safe Mode with Networking":

Windows 8 users: Start Windows 8 is Safe Mode with Networking - Go to Windows 8 Start Screen, type Advanced, in the search results select Settings. Click Advanced startup options, in the opened "General PC Settings" window, select Advanced startup.

Click the "Restart now" button. Your computer will now restart into the "Advanced Startup options menu". Click the "Troubleshoot" button, and then click the "Advanced options" button. In the advanced option screen, click "Startup settings". Click the "Restart" button. Your PC will restart into the Startup Settings screen. Press F5 to boot in Safe Mode with Networking.

Windows 8 Safe Mode with networking

Video showing how to start Windows 8 in "Safe Mode with Networking":

Windows 10 users: Click the Windows logo and select the Power icon. In the opened menu click "Restart" while holding "Shift" button on your keyboard. In the "choose an option" window click on the "Troubleshoot", next select "Advanced options". In the advanced options menu select "Startup Settings" and click on the "Restart" button.

In the following window you should click the "F5" button on your keyboard. This will restart your operating system in safe mode with networking.

windows 10 safe mode with networking

Video showing how to start Windows 10 in "Safe Mode with Networking":

 

manual malware removal step 3Extract the downloaded archive and run the Autoruns.exe file.

extract autoruns.zip and run autoruns.exe

manual malware removal step 4In the Autoruns application, click "Options" at the top and uncheck "Hide Empty Locations" and "Hide Windows Entries" options. After this procedure, click the "Refresh" icon.

Click 'Options' at the top and uncheck 'Hide Empty Locations' and 'Hide Windows Entries' options

manual malware removal step 5Check the list provided by the Autoruns application and locate the malware file that you want to eliminate.

You should write down its full path and name. Note that some malware hides process names under legitimate Windows process names. At this stage, it is very important to avoid removing system files. After you locate the suspicious program you wish to remove, right click your mouse over its name and choose "Delete".

locate the malware file you want to remove

After removing the malware through the Autoruns application (this ensures that the malware will not run automatically on the next system startup), you should search for the malware name on your computer. Be sure to enable hidden files and folders before proceeding. If you find the filename of the malware, be sure to remove it.

searching for malware file on your computer

Reboot your computer in normal mode. Following these steps should remove any malware from your computer. Note that manual threat removal requires advanced computer skills. If you do not have these skills, leave malware removal to antivirus and anti-malware programs.

These steps might not work with advanced malware infections. As always it is best to prevent infection than try to remove malware later. To keep your computer safe, install the latest operating system updates and use antivirus software.

To be sure your computer is free of malware infections, we recommend scanning it with Combo Cleaner Antivirus for Windows.

▼ Show Discussion

About the author:

Tomas Meskauskas

Tomas Meskauskas - expert security researcher, professional malware analyst.

I am passionate about computer security and technology. I have an experience of over 10 years working in various companies related to computer technical issue solving and Internet security. I have been working as an author and editor for pcrisk.com since 2010. Follow me on Twitter and LinkedIn to stay informed about the latest online security threats. Contact Tomas Meskauskas.

PCrisk security portal is brought by a company RCS LT. Joined forces of security researchers help educate computer users about the latest online security threats. More information about the company RCS LT.

Our malware removal guides are free. However, if you want to support us you can send us a donation.

About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Removal Instructions in other languages
Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

QR Code
Valak virus QR code
Scan this QR code to have an easy access removal guide of Valak virus on your mobile device.
We Recommend:

Get rid of Windows malware infections today:

▼ REMOVE IT NOW
Download Combo Cleaner

Platform: Windows

Editors' Rating for Combo Cleaner:
Editors ratingOutstanding!

[Back to Top]

To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.