Malware

Troj/Miner-ACV removal tips

Malware Removal

The Troj/Miner-ACV is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Troj/Miner-ACV virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Attempts to connect to a dead IP:Port (2 unique times)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Network anomalies occured during the analysis.
  • Enumerates running processes
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • CAPE detected the CoinMiner02 malware family
  • Unusual version info supplied for binary

How to determine Troj/Miner-ACV?


File Info:

name: D3D97D371561E5D57A9D.mlw
path: /opt/CAPEv2/storage/binaries/07bdd705ec7d2015e227094f9bf7912758e4bdefb6adf254dd3f7cd19281e33c
crc32: 4A9BC963
md5: d3d97d371561e5d57a9dae2f0db9a909
sha1: f9fa423bbc8162e40c2b33da0e4f8b61003c2242
sha256: 07bdd705ec7d2015e227094f9bf7912758e4bdefb6adf254dd3f7cd19281e33c
sha512: d1d4718ab3a29023d30fdbe47425b0982ff8fc6ef86977299efc1776971244ff83a783a0f47a4d3a991f79eb510b4a9b9b0aed0a72e0f79c1364346f4f635b02
ssdeep: 24576:iag1XdQOBXYz99Cmhdgjp5C7oJLJHGyzUZe6mJ:uXdpYJw+gjQoXLEe6I
type: PE32+ executable (console) x86-64, for MS Windows
tlsh: T1E245334162AF513ED94481BEC83F3731E31F2986A166BE5AA0B760B13BDFE4478067D4
sha3_384: 1c3a32610c0ba0f0743db36f0b03c38ba191a2d721cb6e2b2b92699c0a9200be485de3b0784bd757843cca08120a124d
ep_bytes: 53565755488d351acbecff488dbedb5f
timestamp: 1970-01-01 00:00:00

Version Info:

CompanyName:
FileDescription: Services and Controller app
FileVersion: 10.0.17134.1 (WinBuild.160101.0800)
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFilename: services.exe
ProductName: Services and Controller app
ProductVersion: 10.0.17134.1 (WinBuild.160101.0800)
Translation: 0x0000 0x04b0

Troj/Miner-ACV also known as:

Elasticmalicious (high confidence)
DrWebTrojan.Siggen14.61551
MicroWorld-eScanGen:Variant.Midie.96670
FireEyeGeneric.mg.d3d97d371561e5d5
ALYacGen:Variant.Midie.96670
CylanceUnsafe
SangforSuspicious.Win32.Save.a
Cybereasonmalicious.bbc816
CyrenW64/Trojan.GOB.gen!Eldorado
SymantecTrojan.Gen.MBT
ESET-NOD32a variant of Win64/CoinMiner.MW
TrendMicro-HouseCallTROJ_GEN.R035C0DKO21
KasperskyTrojan.Win32.Miner.axmji
BitDefenderGen:Variant.Midie.96670
AvastFileRepMalware
RisingHackTool.CoinMiner!1.B971 (CLASSIC)
Ad-AwareGen:Variant.Midie.96670
SophosTroj/Miner-ACV
TrendMicroTROJ_GEN.R035C0DKO21
McAfee-GW-EditionBehavesLike.Win64.Generic.tc
SentinelOneStatic AI – Malicious PE
EmsisoftGen:Variant.Midie.96670 (B)
IkarusTrojan.Win64.CoinMiner
JiangminTrojan.Miner.qkb
MaxSecureTrojan.Malware.300983.susgen
AviraHEUR/AGEN.1120937
MicrosoftTrojan:Win64/DisguisedXMRigMiner
GDataGen:Variant.Midie.96670
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win.Miner3.R424045
Acronissuspicious
McAfeeArtemis!D3D97D371561
MalwarebytesTrojan.BitCoinMiner
APEXMalicious
TencentWin32.Trojan.Miner.Wsjx
YandexTrojan.GenAsa!D7CCRkGYi1M
MAXmalware (ai score=88)
FortinetRiskware/CoinMiner
AVGFileRepMalware

How to remove Troj/Miner-ACV?

Troj/Miner-ACV removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment