Malware

Troj/NanoCo-AKX removal

Malware Removal

The Troj/NanoCo-AKX is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Troj/NanoCo-AKX virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Expresses interest in specific running processes
  • Reads data out of its own binary image
  • A process created a hidden window
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Executed a process and injected code into it, probably while unpacking
  • Attempts to remove evidence of file being downloaded from the Internet
  • Tries to unhook or modify Windows functions monitored by Cuckoo
  • Installs itself for autorun at Windows startup
  • Exhibits behavior characteristic of Nanocore RAT
  • Creates a copy of itself
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

How to determine Troj/NanoCo-AKX?


File Info:

crc32: 2AE624E7
md5: af2b7dc34bb7a628d97a909ae54159a1
name: upload_file
sha1: 99fe057c3bc249bcc23be977c5fc694eeb437566
sha256: 93e44f3a49647573e0de42b29d80a9ce0af5cb879417e6a3f6a238d88979c662
sha512: 5a711750b3178465b744e6d6af88e9da0f3739bb40101fce270963052136a304c7d825a2b6e490da9ff8dfe7f72bc43a16e210ac464ae9f1c00d7b6ce58af12e
ssdeep: 12288:B1i+/Z6i2pC138ktn6gCA4iFsrnTp1zPgcER7zu8WQfQDO4eEC5UAYrgJ:TNZopgQgY2O9IcERn5pQDEEtAz
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Troj/NanoCo-AKX also known as:

BkavW32.AIDetectVM.malware2
MicroWorld-eScanTrojan.GenericKD.43572842
FireEyeGeneric.mg.af2b7dc34bb7a628
CAT-QuickHealTrojan.Crypt
Qihoo-360Win32/Trojan.ed1
McAfeeArtemis!AF2B7DC34BB7
CylanceUnsafe
VIPRETrojan.Win32.Generic!BT
CrowdStrikewin/malicious_confidence_100% (W)
BitDefenderTrojan.GenericKD.43572842
K7GWTrojan ( 0056baa21 )
K7AntiVirusTrojan ( 0056baa21 )
TrendMicroTROJ_GEN.R044C0RH120
SymantecML.Attribute.HighConfidence
APEXMalicious
Paloaltogeneric.ml
GDataTrojan.GenericKD.43572842
KasperskyHEUR:Trojan.Win32.Crypt.gen
AlibabaTrojan:Win32/DelfInject.ali2000015
ViRobotTrojan.Win32.Z.Wacatac.734720
AegisLabTrojan.Win32.Crypt.4!c
Endgamemalicious (high confidence)
EmsisoftTrojan.GenericKD.43572842 (B)
F-SecureDropper.DR/Delphi.hwjcy
DrWebTrojan.PWS.GrandStealNET.2
Invinceaheuristic
Trapminesuspicious.low.ml.score
SophosTroj/NanoCo-AKX
SentinelOneDFI – Suspicious PE
CyrenW32/Trojan.ZMEZ-6003
AviraDR/Delphi.hwjcy
MAXmalware (ai score=83)
MicrosoftBackdoor:MSIL/Noancooe.C
ArcabitTrojan.Generic.D298DE6A
ZoneAlarmHEUR:Trojan.Win32.Crypt.gen
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.AgentTesla.C4174255
Acronissuspicious
ALYacSpyware.AgentTesla
Ad-AwareTrojan.GenericKD.43572842
MalwarebytesTrojan.MalPack.DLF
ESET-NOD32a variant of Win32/Injector.EMVB
TrendMicro-HouseCallTROJ_GEN.R044C0RH120
RisingTrojan.Injector!1.C99D (CLOUD)
IkarusTrojan-Dropper.Win32.Autoit
eGambitUnsafe.AI_Score_99%
BitDefenderThetaGen:NN.ZelphiF.34144.SGW@amDHwZfi
AVGWin32:Trojan-gen
Cybereasonmalicious.c3bc24
AvastWin32:Trojan-gen
MaxSecureTrojan.Malware.300983.susgen

How to remove Troj/NanoCo-AKX?

Troj/NanoCo-AKX removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment