Malware

Troj/Steal-AGH removal tips

Malware Removal

The Troj/Steal-AGH is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Troj/Steal-AGH virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • The binary likely contains encrypted or compressed data.
  • Executed a process and injected code into it, probably while unpacking
  • Attempts to remove evidence of file being downloaded from the Internet
  • Tries to unhook or modify Windows functions monitored by Cuckoo
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Installs itself for autorun at Windows startup
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Creates a copy of itself
  • Harvests credentials from local FTP client softwares
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine Troj/Steal-AGH?


File Info:

crc32: 22279BFF
md5: 196618ad0d6494a299207d0a006e04a2
name: RE,NEW PURCHASEING ORDER.exe
sha1: 7afd09b68bf5ca7090fc6d9ea60116ca224c7932
sha256: 31198541765ce3c6e0681658d68a3a6ea70a99f484e05bce3e77f57ed55171c7
sha512: e5675d190eb1fc88782645e3abdcae22d3cee0669778c07b20d2d4f0ed8fb131dc17898694fd829473287aa384bf2d55a598783ed402334d239649a11bb68e4d
ssdeep: 12288:TRXtpnVH9Az44BnvOCDhzcl0UdKndi2bnXOPnlLTDWisnaRYxH7J24G:Tfd8z4byilBdlGX2qnvp70j
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Troj/Steal-AGH also known as:

BkavW32.AIDetectVM.malware2
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKD.34262083
FireEyeGeneric.mg.196618ad0d6494a2
Qihoo-360Generic/HEUR/QVM05.1.E528.Malware.Gen
McAfeeFareit-FPQ!196618AD0D64
CylanceUnsafe
VIPRETrojan.Win32.Generic!BT
K7AntiVirusTrojan ( 0056b6131 )
BitDefenderTrojan.GenericKD.34262083
K7GWTrojan ( 0056b6131 )
Cybereasonmalicious.68bf5c
TrendMicroTROJ_GEN.R044C0DGU20
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastWin32:Trojan-gen
KasperskyHEUR:Trojan.Win32.Kryptik.gen
AlibabaTrojan:Win32/DelfInject.ali2000015
ViRobotTrojan.Win32.Z.Injector.745472.CW
AegisLabTrojan.Win32.Kryptik.4!c
RisingTrojan.Injector!1.C99D (CLOUD)
Ad-AwareTrojan.GenericKD.34262083
SophosTroj/Steal-AGH
F-SecureTrojan.TR/Injector.ssozp
DrWebTrojan.PWS.Stealer.19347
Invinceaheuristic
EmsisoftTrojan.GenericKD.34262083 (B)
SentinelOneDFI – Suspicious PE
CyrenW32/Trojan.EPVT-6918
JiangminTrojan.Kryptik.byu
AviraTR/Injector.ssozp
FortinetW32/Injector.EMTN!tr
ArcabitTrojan.Generic.D20ACC43
ZoneAlarmHEUR:Trojan.Win32.Kryptik.gen
MicrosoftTrojan:Win32/FormBook.DE!MTB
AhnLab-V3Trojan/Win32.Kryptik.C4171286
Acronissuspicious
BitDefenderThetaGen:NN.ZelphiF.34144.TGW@am9mxpni
ALYacTrojan.GenericKDZ.69102
MAXmalware (ai score=81)
VBA32TScope.Trojan.Delf
MalwarebytesSpyware.LokiBot
PandaTrj/CI.A
ESET-NOD32a variant of Win32/Injector.EMUK
TrendMicro-HouseCallTROJ_GEN.R044C0DGU20
IkarusTrojan-Dropper.Win32.Autoit
GDataTrojan.GenericKD.34262083
AVGWin32:Trojan-gen
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_90% (W)

How to remove Troj/Steal-AGH?

Troj/Steal-AGH removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment