Malware

About “Troj/Steal-AKH” infection

Malware Removal

The Troj/Steal-AKH is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Troj/Steal-AKH virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Creates RWX memory
  • A process created a hidden window
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Executed a process and injected code into it, probably while unpacking
  • Creates a copy of itself

How to determine Troj/Steal-AKH?


File Info:

crc32: 189E3292
md5: 9c7678079413157ea81174623a4f0f59
name: upload_file
sha1: aabcd5e57e76d59eb0439dba7d59c4008f224447
sha256: 1e1ab7c62b4c738adfd04a5b4c1b80f1ac02529f31f3de1a3755d4e10c317691
sha512: 3441d9a10d3b18333f8044cf62eb078036a3a9f82822596d2730365cf62dbdc5137180961c7b1c9855e50f1bd3631c64ead9a5eac506af47338b4a1c20966bfe
ssdeep: 12288:mjl+j4VTLWimIACSptknADnqsmtkC4uHhx45FbBIGZ:mjoGLyI2ptRnT1CfHIPb
type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows

Version Info:

Translation: 0x0000 0x04b0
LegalCopyright: Copyright xa9 2020 UK Athletics Games
Assembly Version: 2.0.2.0
InternalName: xYP.exe
FileVersion: 2.0.2.0
CompanyName: UK Athletics Games
LegalTrademarks:
Comments: The Alexander Stadium
ProductName: The Alexander Stadium
ProductVersion: 2.0.2.0
FileDescription: The Alexander Stadium
OriginalFilename: xYP.exe

Troj/Steal-AKH also known as:

MicroWorld-eScanTrojan.GenericKD.34344428
Qihoo-360Generic/HEUR/QVM03.0.308F.Malware.Gen
McAfeeFareit-FXO!9C7678079413
CylanceUnsafe
K7AntiVirusTrojan ( 0056c5151 )
BitDefenderTrojan.GenericKD.34344428
K7GWTrojan ( 0056c5151 )
Cybereasonmalicious.57e76d
TrendMicroTrojanSpy.MSIL.GORGON.USXVPHC20
F-ProtW32/MSIL_Kryptik.BKC.gen!Eldorado
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastWin32:MalwareX-gen [Trj]
KasperskyHEUR:Trojan-PSW.MSIL.Agensla.gen
AlibabaTrojanPSW:MSIL/AgentTesla.03fcd9a7
ViRobotTrojan.Win32.Z.Kryptik.580608.L
AegisLabTrojan.MSIL.Agensla.i!c
TencentMsil.Trojan-qqpass.Qqrob.Hvsw
Ad-AwareTrojan.GenericKD.34344428
ComodoTrojWare.Win32.Agent.xlfmc@0
F-SecureTrojan.TR/Kryptik.ijoah
DrWebBackDoor.SpyBotNET.25
VIPRETrojan.Win32.Generic!BT
Invinceaheuristic
FortinetMSIL/Kryptik.XIB!tr
FireEyeGeneric.mg.9c7678079413157e
SophosTroj/Steal-AKH
IkarusTrojan-Spy.MassLogger
CyrenW32/MSIL_Kryptik.BJZ.gen!Eldorado
JiangminTrojan.PSW.MSIL.aoem
WebrootW32.Trojan.Gen
AviraTR/Kryptik.ijoah
MAXmalware (ai score=83)
Antiy-AVLTrojan/MSIL.Kryptik
ArcabitTrojan.Generic.D20C0DEC
ZoneAlarmHEUR:Trojan-PSW.MSIL.Agensla.gen
MicrosoftTrojan:MSIL/AgentTesla.W!MTB
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.Kryptik.R347699
BitDefenderThetaGen:NN.ZemsilF.34152.Jm0@aS30U1i
ALYacTrojan.GenericKD.34344428
VBA32TScope.Trojan.MSIL
MalwarebytesTrojan.MalPack
PandaTrj/GdSda.A
ESET-NOD32a variant of MSIL/Kryptik.XIB
TrendMicro-HouseCallTrojanSpy.MSIL.GORGON.USXVPHC20
RisingTrojan.Kryptik!8.8 (CLOUD)
SentinelOneDFI – Malicious PE
eGambitUnsafe.AI_Score_99%
GDataTrojan.GenericKD.34344428
AVGWin32:MalwareX-gen [Trj]
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_60% (W)
MaxSecureTrojan.Malware.300983.susgen

How to remove Troj/Steal-AKH?

Troj/Steal-AKH removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment