Malware

Should I remove “Troj/Steal-ZC”?

Malware Removal

The Troj/Steal-ZC is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Troj/Steal-ZC virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Injection with CreateRemoteThread in a remote process
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • The binary likely contains encrypted or compressed data.
  • Executed a process and injected code into it, probably while unpacking
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Steals private information from local Internet browsers
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Harvests credentials from local FTP client softwares
  • Harvests information related to installed mail clients

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine Troj/Steal-ZC?


File Info:

crc32: 10432ECE
md5: 725e35579729f915e514d7b252a4f5b9
name: tmpdegoifb9
sha1: adb10c9338a0ada3a6e01ce377c9b864df843ff2
sha256: 40afcc6e1d0b2d6184ac09a8dfcfef7298dadbe2bc7abf9f6734c5358fdcd9d1
sha512: ba0fe84d62314f36abe6074bffdf8317e726370412c9900ded09f598bdf497586eed1669c7a2d5ef6ffd0042ddee3b1400f0ed1c0200145f2abc016ebcfae92c
ssdeep: 12288:qPTwH7zA+v5uZHWVK3Cgq83b7SI3iymOO2pj:MM7pvMHT3CgZAXg
type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows

Version Info:

Translation: 0x0000 0x04b0
LegalCopyright: Copyright xa9 Robin Perris
Assembly Version: 1.0.0.1
InternalName: PYiWRhE.exe
FileVersion: 1.0.0.1
CompanyName: Robin Perris
LegalTrademarks:
Comments: Dark themed control and docking library for .NET WinForms.
ProductName: DarkUIReborn
ProductVersion: 1.0.0.1
FileDescription: DarkUIRebron
OriginalFilename: PYiWRhE.exe

Troj/Steal-ZC also known as:

DrWebTrojan.InjectNET.14
MicroWorld-eScanTrojan.GenericKD.34070884
FireEyeGeneric.mg.725e35579729f915
CAT-QuickHealTrojanpws.Msil
McAfeeFareit-FUV!725E35579729
VIPRETrojan.Win32.Generic!BT
AegisLabTrojan.MSIL.Agensla.i!c
K7AntiVirusTrojan ( 005697c31 )
BitDefenderTrojan.GenericKD.34070884
K7GWTrojan ( 005697c31 )
Invinceaheuristic
SymantecML.Attribute.HighConfidence
APEXMalicious
Paloaltogeneric.ml
GDataTrojan.GenericKD.34070884
KasperskyHEUR:Trojan-PSW.MSIL.Agensla.gen
AvastWin32:MalwareX-gen [Trj]
RisingTrojan.Fuery!8.EAFB (CLOUD)
Ad-AwareTrojan.GenericKD.34070884
SophosTroj/Steal-ZC
ComodoMalware@#7g84rt10v08h
TrendMicroTROJ_GEN.R002C0DFQ20
Trapminesuspicious.low.ml.score
EmsisoftTrojan.GenericKD.34070884 (B)
IkarusTrojan.Inject
CyrenW32/MSIL_Kryptik.AYU.gen!Eldorado
JiangminTrojan.PSW.MSIL.ahob
WebrootW32.Trojan.Gen
Endgamemalicious (high confidence)
ArcabitTrojan.Generic.D207E164
ZoneAlarmHEUR:Trojan-PSW.MSIL.Agensla.gen
MicrosoftTrojan:MSIL/AgentTesla.SD!MTB
AhnLab-V3Trojan/Win32.Infostealer.R341647
ALYacTrojan.GenericKD.34070884
MAXmalware (ai score=82)
MalwarebytesSpyware.Agent
ESET-NOD32a variant of MSIL/Kryptik.WNO
TrendMicro-HouseCallTROJ_GEN.R002C0DFQ20
YandexTrojan.AvsArher.bSIdr7
eGambitUnsafe.AI_Score_97%
FortinetMSIL/Kryptik.WNO!tr
AVGWin32:MalwareX-gen [Trj]
PandaTrj/GdSda.A
CrowdStrikewin/malicious_confidence_60% (W)
Qihoo-360Generic/Trojan.PSW.374

How to remove Troj/Steal-ZC?

Troj/Steal-ZC removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment