Malware

Symmi.19539 removal

Malware Removal

The Symmi.19539 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Symmi.19539 virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Russian
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Installs an hook procedure to monitor for mouse events
  • Detects Sandboxie through the presence of a library
  • Collects and encrypts information about the computer likely to send to C2 server
  • Attempts to identify installed analysis tools by a known file location
  • Detects the presence of Wine emulator via registry key
  • Detects VirtualBox through the presence of a device
  • Detects VMware through the presence of a device
  • Checks for a known DeepFreeze Frozen State Mutex
  • Collects information to fingerprint the system

How to determine Symmi.19539?


File Info:

name: EC11A4AECA9DFA164FF3.mlw
path: /opt/CAPEv2/storage/binaries/9e30b2990696ff47753a8299f32896f775b768c1532618fa8f99e1b50e11c19a
crc32: B7D2924B
md5: ec11a4aeca9dfa164ff397cfe1ce3c10
sha1: 7c618eb47a9b49d94bd3326830be07f8897ca1ce
sha256: 9e30b2990696ff47753a8299f32896f775b768c1532618fa8f99e1b50e11c19a
sha512: 061f2b469c69aa313fa4a10668858e98b2a0ecd29c9ac86a2334f867226bd31214686b714cae94b1af6f6f116a2f18024bb3df5278e783badff4c38fade4c673
ssdeep: 6144:Wl7G+4ptfuIuRmLogOm0fsOL7CJT2CFN84RC:iPaZu3Rndx/G84R
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1823402208F248FCDFDE815B0EC82EAFA7458BD138564F54930AC731D2E79C566A139B6
sha3_384: 3cad9e88213f8ee47c5ac8db033f4a0f00e2263f6c3ebd7d1dae8ee1483fb1dc09ce0086611781cb6a68c55698615ad7
ep_bytes: 60be00b042008dbe0060fdff5783cdff
timestamp: 2013-04-10 15:39:12

Version Info:

CompanyName: Intway Solutions
FileDescription: SQLite Compatibility Assistant User Interface
FileVersion: 5.2.4.1
InternalName: scompui
LegalCopyright: Copyright (C) 2006-2012 - Intway Solutions
OriginalFilename: scompui
ProductName: SQLite Compatibility Assistant User Interface
ProductVersion: 5.2.4.1
Translation: 0x1009 0x04b0

Symmi.19539 also known as:

BkavW32.AIDetect.malware2
LionicTrojan.Win32.Generic.4!c
CynetMalicious (score: 100)
FireEyeGeneric.mg.ec11a4aeca9dfa16
CAT-QuickHealTrojanpws.Zbot.26902
ALYacGen:Variant.Symmi.19539
CylanceUnsafe
VIPRETrojan.Win32.Reveton.b!ag (v)
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 0055dd191 )
AlibabaTrojanPSW:Win32/Kryptik.0777742a
K7GWTrojan ( 0055dd191 )
Cybereasonmalicious.eca9df
VirITTrojan.Win32.Zyx.TM
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.AYWC
APEXMalicious
Paloaltogeneric.ml
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.Symmi.19539
NANO-AntivirusTrojan.Win32.Qbot.cxeuux
MicroWorld-eScanGen:Variant.Symmi.19539
AvastWin32:Malware-gen
TencentWin32.Trojan.Generic.Aker
Ad-AwareGen:Variant.Symmi.19539
EmsisoftGen:Variant.Symmi.19539 (B)
ComodoMalware@#lwkjhnl4jofj
DrWebBackDoor.Qbot.185
ZillyaTrojan.Kryptik.Win32.930627
TrendMicroTSPY_ZBOT.SML0
McAfee-GW-EditionRansom-FBOP!46C7FFF14F34
SophosMal/EncPk-AKK
SentinelOneStatic AI – Malicious PE
GDataGen:Variant.Symmi.19539
JiangminTrojanSpy.Zbot.dafc
WebrootW32.Rogue.Gen
AviraHEUR/AGEN.1206130
MAXmalware (ai score=100)
Antiy-AVLTrojan/Win32.AGeneric
KingsoftWin32.Troj.Zbot.kh.(kcloud)
ArcabitTrojan.Symmi.D4C53
ZoneAlarmHEUR:Trojan.Win32.Generic
MicrosoftPWS:Win32/Zbot
McAfeeArtemis!EC11A4AECA9D
VBA32TrojanSpy.Zbot
TrendMicro-HouseCallTSPY_ZBOT.SML0
RisingSpyware.Zbot!8.16B (CLOUD)
YandexTrojan.GenAsa!i1HhYReU7vY
IkarusTrojan-Ransom.Foreign
eGambitGeneric.Malware
FortinetW32/Zbot.AAO!tr
BitDefenderThetaGen:NN.ZexaF.34212.pmKfaSEQ2olk
AVGWin32:Malware-gen
PandaTrj/Genetic.gen
CrowdStrikewin/malicious_confidence_70% (W)
MaxSecureTrojan.Malware.300983.susgen

How to remove Symmi.19539?

Symmi.19539 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment