Malware

What is “Troj/PSDrop-AP”?

Malware Removal

The Troj/PSDrop-AP is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Troj/PSDrop-AP virus can do?

  • Injection (inter-process)
  • Uses Windows utilities for basic functionality
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • A potential decoy document was displayed to the user
  • Network activity detected but not expressed in API logs

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine Troj/PSDrop-AP?


File Info:

crc32: 910F54A9
md5: 33ebd99acbe412317d1f8f84c5427f60
name: upload_file
sha1: 2059404a53125c643248d690c019113c0c4401ce
sha256: 81c9ee2eb3ad8fcbb954cc40080e29598e30fc0794d9a32b7e546870dddb2047
sha512: d267d6dc5dfed8cf6301d34241805f3ae3be4f060053c2c386e6f8d9ba546d161528aa9b4326e677b0e2abf9943bea064c4e709f380ed79e861774290d68e547
ssdeep: 48:CJKJoBhUYexuFXFc2E1274Rv+YfxCZjkU6ElVyIz/jY5AuiX2hdXfP:BJY+uJFhE1274kYfkyCVdb7J4X
type: ASCII text, with very long lines, with no line terminators

Version Info:

0: [No Data]

Troj/PSDrop-AP also known as:

ComodoTrojWare.Win32.BadShell.XSP@7pmj0k
SophosTroj/PSDrop-AP

How to remove Troj/PSDrop-AP?

Troj/PSDrop-AP removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment