Spy

How to remove “Spyware.PasswordStealer.VMP”?

Malware Removal

The Spyware.PasswordStealer.VMP is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Spyware.PasswordStealer.VMP virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • A process attempted to delay the analysis task.
  • Attempts to connect to a dead IP:Port (19 unique times)
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Starts servers listening on 127.0.0.1:0
  • Expresses interest in specific running processes
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
  • Reads data out of its own binary image
  • A process created a hidden window
  • Drops a binary and executes it
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Looks up the external IP address
  • A scripting utility was executed
  • Uses Windows utilities for basic functionality
  • Detects Sandboxie through the presence of a library
  • Detects Avast Antivirus through the presence of a library
  • Executed a process and injected code into it, probably while unpacking
  • Checks for the presence of known windows from debuggers and forensic tools
  • Steals private information from local Internet browsers
  • Network activity contains more than one unique useragent.
  • The following process appear to have been packed with Themida: yUpJN_CxCwqjFOZmsg7sAc6i.exe, xcAKMi5OPCr4nAg_CJX73WRQ.exe, njhjaR9KpYAUdhR8p5lgiC0x.exe, AnJsaI2ymB6sIBYNxG7CW44a.exe, wwl.exe, wwi.exe, AuZ2qkqS5O71ZlZ3vj8IvRHy.exe
  • Installs itself for autorun at Windows startup
  • Exhibits possible ransomware file modification behavior
  • Writes a potential ransom message to disk
  • Creates a hidden or system file
  • Checks the version of Bios, possibly for anti-virtualization
  • Detects VirtualBox through the presence of a registry key
  • Attempts to modify proxy settings
  • Attempts to disable Windows Defender
  • Attempts to create or modify system certificates
  • Collects information to fingerprint the system
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

Related domains:

hsiens.xyz
a.goatgame.co
cleaner-partners.biz
safialinks.com
www.listincode.com
cdn.discordapp.com
ocsp.digicert.com
statuse.digitalcertvalidation.com
ipinfo.io
iplogger.org
suriyecastajanslari.bykmedya.com
www.svanaturals.com
www.invch.com
privacytoolz123foryou.top
installcb.ru
telegram.org
iplis.ru
twitter.com
yandex.ru
apps.identrust.com
ocsp.comodoca.com
ocsp.usertrust.com
crl.usertrust.com
ocsp.sectigo.com
petrenko96.tumblr.com
ocsp.verisign.com
www.public-trust.com

How to determine Spyware.PasswordStealer.VMP?


File Info:

crc32: 5FE9A6E4
md5: 591c62c68ce81550a99f07e173a56217
name: 591C62C68CE81550A99F07E173A56217.mlw
sha1: 4e5d00df20e12a0cc74189eb691e063b3a84990a
sha256: 1eb3574e7faa18d12759034dcc5a26ac90d79badef17cf1a744854d9a9e41cb0
sha512: 71f4068cc19d72251bbb29609d1ff2564228e1050c82006b82e45ac7f868c9e2cae3e738b2d3d30d372f2de4a4e1e52386cc54dede20848af4c92591dadfb4a5
ssdeep: 196608:yMz7bKY8qgkL5ZYlCV6JtZ1eJLPj4F4z/eHFDKED:yfY8V+5ZcCVmZ1eJLPj4ujeHxLD
type: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive

Version Info:

0: [No Data]

Spyware.PasswordStealer.VMP also known as:

LionicTrojan.Win32.Fabookie.4!c
Elasticmalicious (high confidence)
DrWebTrojan.Inject4.16523
ClamAVWin.Dropper.Pswtool-9857535-0
ALYacGen:Variant.Jaik.45861
CylanceUnsafe
AlibabaTrojanDownloader:Win32/Fabookie.7596d3de
CyrenW32/Kryptik.EWJ.gen!Eldorado
SymantecTrojan.Gen.MBT
ESET-NOD32multiple detections
APEXMalicious
AvastWin64:Malware-gen
CynetMalicious (score: 100)
KasperskyTrojan.Win32.Fabookie.yr
BitDefenderGen:Variant.Jaik.45861
NANO-AntivirusTrojan.Win32.Zenlod.jaoatz
MicroWorld-eScanGen:Variant.Jaik.45861
TencentWin32.Trojan.Fabookie.Suoa
BitDefenderThetaGen:NN.ZexaF.34142.tq0@aaelqCoO
FireEyeGeneric.mg.591c62c68ce81550
EmsisoftGen:Variant.Jaik.45861 (B)
SentinelOneStatic AI – Suspicious PE
AviraHEUR/AGEN.1144141
Antiy-AVLTrojan/Generic.ASMalwS.3499B3E
KingsoftWin32.PSWTroj.Undef.(kcloud)
GridinsoftTrojan.Win32.Dropper.ko!s5
ArcabitTrojan.Jaik.DB325
ZoneAlarmTrojan.Win32.Fabookie.yr
GDataMSIL.Trojan-Stealer.Redline.19T51I
AhnLab-V3Dropper/Win.MulDrop.R439720
McAfeeArtemis!591C62C68CE8
MAXmalware (ai score=87)
VBA32Trojan.Sdum
MalwarebytesSpyware.PasswordStealer.VMP
PandaTrj/CI.A
TrendMicro-HouseCallTROJ_GEN.R002C0RIH21
RisingDropper.Agent/NSIS!1.D805 (CLASSIC)
IkarusTrojan.Win64.Agent
FortinetPossibleThreat.PALLASNET.H
AVGWin64:Malware-gen
Paloaltogeneric.ml

How to remove Spyware.PasswordStealer.VMP?

Spyware.PasswordStealer.VMP removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment