Trojan

Trojan.Agent.ADS malicious file

Malware Removal

The Trojan.Agent.ADS is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Agent.ADS virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (2 unique times)
  • Creates RWX memory
  • Reads data out of its own binary image
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • A scripting utility was executed
  • Attempts to remove evidence of file being downloaded from the Internet
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Installs itself for autorun at Windows startup
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Attempts to interact with an Alternate Data Stream (ADS)

Related domains:

z.whorecord.xyz
a.tomx.xyz
google.ru

How to determine Trojan.Agent.ADS?


File Info:

crc32: C15F862C
md5: 389c4fa866982f6c3d37c2f9af82569f
name: upload_file
sha1: 018c1f8bd691209c9f48e419b0ce2c99248d8a7e
sha256: a4cb4b3c28208b5f92691ffa076e7926b70f7c2f03911c5772f3db84f0994807
sha512: db8bcf3339858ec974f9bf3ef9adb5fbabd00f189583252c37b12d2c4eb974570fc24f87eaa51657f54581d08a5ad56fcde41c909e8245427b8053eb96addca2
ssdeep: 12288:2RiyiDdk/dkMaumZfF/gv0ZtzrIZvY8yb6AY5:IiyMgiu0WZAr6
type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed

Version Info:

0: [No Data]

Trojan.Agent.ADS also known as:

BkavW32.AIDetectVM.malware2
Elasticmalicious (high confidence)
DrWebTrojan.PWS.Siggen2.56790
MicroWorld-eScanGen:Variant.Razy.626613
FireEyeGeneric.mg.389c4fa866982f6c
CAT-QuickHealTrojan.Generic
Qihoo-360Generic/HEUR/QVM11.1.8E2D.Malware.Gen
McAfeeRDN/Generic.rp
CylanceUnsafe
SangforMalware
K7AntiVirusTrojan ( 00570b091 )
BitDefenderGen:Variant.Razy.626613
K7GWTrojan ( 00570b091 )
Cybereasonmalicious.866982
TrendMicroTrojan.Win32.WACATAC.THJABBO
BitDefenderThetaAI:Packer.96DF61E11F
CyrenW32/Kryptik.BKJ.gen!Eldorado
SymantecML.Attribute.HighConfidence
ZonerTrojan.Win32.95821
TrendMicro-HouseCallTrojan.Win32.WACATAC.THJABBO
AvastWin32:Malware-gen
ClamAVWin.Packed.AveMaria-9775756-1
KasperskyHEUR:Trojan.Win32.Generic
AlibabaTrojan:Win32/Pynamer.c09349f9
NANO-AntivirusTrojan.Win32.AveMaria.hzfrcz
ViRobotTrojan.Win32.Z.Razy.478208.A
Ad-AwareGen:Variant.Razy.626613
SophosMal/Generic-S
ComodoMalware@#3dmqruno53qgu
F-SecureTrojan.TR/Crypt.ULPM.Gen
VIPRETrojan.Win32.Generic!BT
InvinceaMal/Generic-S
McAfee-GW-EditionBehavesLike.Win32.Trojan.gc
EmsisoftGen:Variant.Razy.626613 (B)
IkarusTrojan.Win32.BadJoke
JiangminTrojanSpy.AveMaria.ku
WebrootW32.Trojan.Gen
AviraTR/Crypt.ULPM.Gen
Antiy-AVLTrojan/Win32.Kryptik
MicrosoftTrojan:Win32/Pynamer.A!ac
ArcabitTrojan.Razy.D98FB5
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataWin64.Trojan.Kryptik.77K854
CynetMalicious (score: 100)
VBA32Trojan.Pynamer
ALYacGen:Variant.Razy.626613
MAXmalware (ai score=81)
MalwarebytesTrojan.Agent.ADS
PandaTrj/GdSda.A
APEXMalicious
ESET-NOD32a variant of Win32/Kryptik.HGQD
TencentWin32.Trojan.Generic.Llhs
TACHYONTrojan-Spy/W32.AveMaria.2201088
FortinetW32/Generic!tr
AVGWin32:Malware-gen
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_60% (W)

How to remove Trojan.Agent.ADS?

Trojan.Agent.ADS removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment