Malware

TDss.54 malicious file

Malware Removal

The TDss.54 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What TDss.54 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Mimics the system’s user agent string for its own requests
  • Anomalous file deletion behavior detected (10+)
  • Dynamic (imported) function loading detected
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Performs HTTP requests potentially not found in PCAP.
  • Starts servers listening on 0.0.0.0:14024, :0
  • Enumerates running processes
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • Unconventionial language used in binary resources: Russian
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Code injection with CreateRemoteThread in a remote process
  • Behavioural detection: Injection (inter-process)
  • Behavioural detection: Injection with CreateRemoteThread in a remote process
  • Tries to unhook or modify Windows functions monitored by Cuckoo
  • Steals private information from local Internet browsers
  • Collects and encrypts information about the computer likely to send to C2 server
  • Installs itself for autorun at Windows startup
  • Attempts to modify proxy settings
  • Attempts to modify browser security settings
  • Harvests credentials from local FTP client softwares
  • Collects information to fingerprint the system
  • Clears web history

How to determine TDss.54?


File Info:

name: 0E6C3081B534618E47C2.mlw
path: /opt/CAPEv2/storage/binaries/25d6e70e66db4056bcaf9c3074227a75a556943c6afb81f9a452e4eda697e48b
crc32: E1C5E53E
md5: 0e6c3081b534618e47c2a07b5c0ad393
sha1: 54ff3d1e02eb96dba3fb8016805c8b4d51d6eb83
sha256: 25d6e70e66db4056bcaf9c3074227a75a556943c6afb81f9a452e4eda697e48b
sha512: f662491dfabc0f3ec8d762819ceca13a97e4c93a7c12040305d34b04c4b079b7fad4fd4e44af1c26400d6c0f63b9bfd0483824bb0fc24be2dd3752884222f6c8
ssdeep: 3072:wVAN67I69781KTIWydNZehAKeMgx3hTINnM8BVlfTNBDDLDJcx:wVAs94KTGZeh8MI3cVl7Ox
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T119E31252E5E162FFD55D01335869C7D3FAED60A52339EE048AB5CF67A2DB89300362D0
sha3_384: e7c99cf025bf7790b1322c846370b3373791f7d4b2534eb880261f7d12cccba5e8aea644dc886a5b59f1a9ea4e2e54db
ep_bytes: 60be004042008dbe00d0fdff57eb0b90
timestamp: 2007-06-18 09:30:15

Version Info:

0: [No Data]

TDss.54 also known as:

BkavW32.AIDetect.malware2
LionicTrojan.Win32.Zbot.lijp
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.TDss.54
FireEyeGeneric.mg.0e6c3081b534618e
CAT-QuickHealTrojan.Zbot.Y4
ALYacSpyware.Zbot.vx
CylanceUnsafe
VIPREVirTool.Win32.Obfuscator.da!j (v)
SangforTrojan.Win32.Zbot.avlc
AlibabaTrojanSpy:Win32/Kryptik.2643fac5
Cybereasonmalicious.1b5346
BitDefenderThetaAI:Packer.35C5E1AC1F
VirITTrojan.Win32.Panda.OX
CyrenW32/FakeAlert.LD.gen!Eldorado
SymantecTrojan.Zbot!gen14
ESET-NOD32a variant of Win32/Kryptik.SRZ
TrendMicro-HouseCallTROJ_SPYEYE.SMEP
ClamAVWin.Trojan.Zbot-51329
KasperskyTrojan-Spy.Win32.Zbot.avlc
BitDefenderGen:Variant.TDss.54
NANO-AntivirusTrojan.Win32.Zbot.iueyj
APEXMalicious
TencentWin32.Trojan-spy.Zbot.Hpk
Ad-AwareGen:Variant.TDss.54
SophosMal/Generic-S + Mal/Agent-IE
ComodoTrojWare.Win32.TrojanSpy.Zbot.G@2tckk5
DrWebTrojan.PWS.Panda.387
ZillyaTrojan.Zbot.Win32.28145
TrendMicroTROJ_SPYEYE.SMEP
McAfee-GW-EditionBehavesLike.Win32.Spyeye.cc
EmsisoftGen:Variant.TDss.54 (B)
IkarusTrojan-Spy.Win32.Zbot
GDataGen:Variant.TDss.54
JiangminTrojanSpy.Zbot.askh
WebrootW32.Malware.Gen
AviraTR/Crypt.ULPM.Gen
MAXmalware (ai score=100)
ViRobotTrojan.Win32.S.Zbot.155648.B
ZoneAlarmTrojan-Spy.Win32.Zbot.avlc
MicrosoftPWS:Win32/Zbot.gen!Y
CynetMalicious (score: 100)
AhnLab-V3Win-Trojan/Zbot.155648.BG
Acronissuspicious
McAfeeArtemis!0E6C3081B534
VBA32Trojan.Zeus.EA.0999
AvastFileRepMalware
RisingSpyware.Zbot!8.16B (CLOUD)
YandexTrojanSpy.Zbot!3Uzb50yjhAE
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.2111496.susgen
AVGFileRepMalware
PandaGeneric Malware
CrowdStrikewin/malicious_confidence_100% (W)

How to remove TDss.54?

TDss.54 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment