PUA

PUA:Win32/Ymacco information

Malware Removal

The PUA:Win32/Ymacco is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What PUA:Win32/Ymacco virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • A file was accessed within the Public folder.
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • CAPE detected the shellcode patterns malware family
  • Attempts to modify proxy settings
  • Deletes executed files from disk
  • Touches a file containing cookies, possibly for information gathering
  • Yara detections observed in process dumps, payloads or dropped files

How to determine PUA:Win32/Ymacco?


File Info:

name: 2BF474D29385692E8FC2.mlw
path: /opt/CAPEv2/storage/binaries/5a41a9caea619cbd92e49b97ce24c4bfe8c7f92da64fa98322e389f0fef0e74a
crc32: 688D4B46
md5: 2bf474d29385692e8fc2476da9606d50
sha1: 5b8e03822f22b0ff1caa5b4bce0ded68564280a5
sha256: 5a41a9caea619cbd92e49b97ce24c4bfe8c7f92da64fa98322e389f0fef0e74a
sha512: e34ab5fc073aee2b95534e0580efd6919e91aa35492abd9b9741b210625a3ea28d27037b8c908d112aceb1d89451b8f07ad1b429598c225ce246762adad429a6
ssdeep: 24576:N86viVKu9DK5o18Tmad9FwrHq08+mt4Xu4PlcqishrHabevHUizQwzUAja6APyq:5ju9G5W4peHUmuScG6bE0i69PP
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T19E752393A7C701B2F5308A38C975D4457D233EF50EF5645A2CBEE14E0A7A2826CB7792
sha3_384: 183cf0cd7380e93464f88aa0168ddffdb1ab5713337dd8f39bb5a8702dd95c96ab0cc31b05cd78792ab2982ba96853b9
ep_bytes: 558bec83c4a453565733c08945c48945
timestamp: 2018-06-14 13:27:46

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName: FalcoWare, Inc.
FileDescription: Eyes Keeper Setup
FileVersion:
LegalCopyright:
ProductName: Eyes Keeper
ProductVersion:
Translation: 0x0000 0x04b0

PUA:Win32/Ymacco also known as:

BkavW32.AIDetectMalware
LionicRiskware.Win32.Relevant.1!c
MicroWorld-eScanGeneric.Application.Bundler.Relevant.A.72D57766
FireEyeGeneric.Application.Bundler.Relevant.A.72D57766
SkyhighBehavesLike.Win32.PUP.tc
McAfeeArtemis!2BF474D29385
Cylanceunsafe
SangforPUP.Win32.Agent.Vvs1
CrowdStrikewin/grayware_confidence_90% (W)
ArcabitGeneric.Application.Bundler.Relevant.A.72D57766
SymantecPUA.Gen.2
ESET-NOD32multiple detections
CynetMalicious (score: 100)
Kasperskynot-a-virus:Downloader.Win32.Agent.mcwx
BitDefenderGeneric.Application.Bundler.Relevant.A.72D57766
NANO-AntivirusTrojan.Win32.Relevant.igojnv
AvastWin32:VSok-A [PUP]
RisingAdware.RelevantKnowledge/IFPS!1.EDA7 (CLASSIC)
SophosFalco Bundleware (PUA)
DrWebAdware.Downware.932
VIPREGeneric.Application.Bundler.Relevant.A.72D57766
EmsisoftGeneric.Application.Bundler.Relevant.A.72D57766 (B)
MAXmalware (ai score=99)
MicrosoftPUA:Win32/Ymacco
ViRobotAdware.Agent.1567324
ZoneAlarmnot-a-virus:Downloader.Win32.Agent.mcwx
GDataWin32.Application.Falco.A
VaristW32/FalcoBundler.C.gen!Eldorado
ALYacGeneric.Application.Bundler.Relevant.A.72D57766
VBA32Downloader.Agent
MalwarebytesAdware.RelevantKnowledge
TencentWin32.Trojan-Downloader.Agent.Fajl
FortinetRiskware/Application
AVGWin32:VSok-A [PUP]
DeepInstinctMALICIOUS

How to remove PUA:Win32/Ymacco?

PUA:Win32/Ymacco removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment