Spy

About “Spyware.PasswordStealer.MPRESS” infection

Malware Removal

The Spyware.PasswordStealer.MPRESS is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Spyware.PasswordStealer.MPRESS virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Executed a command line with /C or /R argument to terminate command shell on completion which can be used to hide execution
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Checks adapter addresses which can be used to detect virtual network interfaces
  • Possible date expiration check, exits too soon after checking local time
  • Dynamic (imported) function loading detected
  • Performs HTTP requests potentially not found in PCAP.
  • A process created a hidden window
  • Executed a command line with /V argument which modifies variable behaviour and whitespace allowing for increased obfuscation options
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Executable file is packed/obfuscated with MPRESS
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Uses Windows utilities for basic functionality
  • Steals private information from local Internet browsers
  • Installs itself for autorun at Windows startup
  • Collects information about installed applications
  • CAPE detected the CryptBot malware family
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Attempts to modify proxy settings
  • Appears to use command line obfuscation
  • Harvests cookies for information gathering
  • Uses suspicious command line tools or Windows utilities

How to determine Spyware.PasswordStealer.MPRESS?


File Info:

name: A73D937192926486BC04.mlw
path: /opt/CAPEv2/storage/binaries/53af23f8f4089f9a714479cb8082618f8a6355c2ffe74bafdac11beb4a2303a0
crc32: 88F8CA9D
md5: a73d937192926486bc042feefd4d5ee2
sha1: 7058da3de5917e9c772bf5808e1cff02380bbfd1
sha256: 53af23f8f4089f9a714479cb8082618f8a6355c2ffe74bafdac11beb4a2303a0
sha512: 3d2d28f0d0cfcd5b4ea10d952767fb4202dadc25c7bccce83eb94e66bcef6204d260e0f9aa536d2cf8fe09dec5d5878d449fddb0dfe3545f5bc2c58ee359ff26
ssdeep: 49152:zNwb6Oi1/c95XKZAmjdx3G+p28dNTgnbznWAWS:qb6OW/c9hKZAmq+o0TQzhWS
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T15A8512D4A4688091DAFCB5F2B967EA2220F93DAD9EC3454D36F932361032957DE0781F
sha3_384: 947d8722b2881c27d0fe26d0e423e8218ebdb097965dbb173a4a7d35043b753121709d923e7e51a5d58cfeabdae016dc
ep_bytes: 60e80000000058055a0b00008b3003f0
timestamp: 2022-06-03 16:46:30

Version Info:

0: [No Data]

Spyware.PasswordStealer.MPRESS also known as:

BkavW32.AIDetect.malware2
tehtrisGeneric.Malware
MicroWorld-eScanGen:Variant.Doina.38752
FireEyeGeneric.mg.a73d937192926486
ALYacGen:Variant.Doina.38752
CylanceUnsafe
VIPREGen:Variant.Doina.38752
Cybereasonmalicious.de5917
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Spy.Agent.PRG
APEXMalicious
KasperskyUDS:DangerousObject.Multi.Generic
BitDefenderGen:Variant.Doina.38752
AvastWin32:Trojan-gen
Ad-AwareGen:Variant.Doina.38752
EmsisoftGen:Variant.Doina.38752 (B)
McAfee-GW-EditionBehavesLike.Win32.Generic.tc
Trapminemalicious.moderate.ml.score
SophosMal/Generic-S
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Script.aurt
WebrootW32.Malware.Gen
AviraTR/Crypt.XPACK.Gen
MAXmalware (ai score=83)
Antiy-AVLTrojan/Generic.ASMalwS.7E9F
MicrosoftTrojan:Win32/Wacatac.B!ml
ArcabitTrojan.Doina.D9760
GDataGen:Variant.Doina.38752
CynetMalicious (score: 100)
AhnLab-V3Backdoor/Win.SuspiciousDomain.C5152788
McAfeeArtemis!A73D93719292
VBA32BScope.Trojan.Convagent
MalwarebytesSpyware.PasswordStealer.MPRESS
IkarusTrojan.Win32.Crypt
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Agent.PRG!tr.spy
BitDefenderThetaGen:NN.ZexaF.34806.Unqaa8pBuTfi
AVGWin32:Trojan-gen
PandaTrj/Genetic.gen
CrowdStrikewin/malicious_confidence_70% (W)

How to remove Spyware.PasswordStealer.MPRESS?

Spyware.PasswordStealer.MPRESS removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment