Trojan

Trojan.Agent.AQSK information

Malware Removal

The Trojan.Agent.AQSK is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Agent.AQSK virus can do?

  • Sample contains Overlay data
  • Uses Windows utilities for basic functionality
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Uses Windows utilities to create a scheduled task
  • Deletes executed files from disk
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Trojan.Agent.AQSK?


File Info:

name: F5E363C286A2483C30DF.mlw
path: /opt/CAPEv2/storage/binaries/7374d698287a96203a31ba7919a231371d322041d889fb04ac9f8fe131e021f0
crc32: 126C7438
md5: f5e363c286a2483c30df3e96ebd8437f
sha1: 33cd734712d1dbfc2e1b748da703457cf3302b42
sha256: 7374d698287a96203a31ba7919a231371d322041d889fb04ac9f8fe131e021f0
sha512: 3e626cb13a23a6387a4691e5c6567bfaca1c0deb30a176b1ab501b1b7bb9bd1a88b0cb5d21066a0381d1b60b1e632ecf7ec1c061b35a3e3e19d3f1c223d71277
ssdeep: 12288:xJzEut4RuAwGgc7fNuIEGpPoHWr2Rkf8I+skzan1/g/J/v5nn:xJzEuAwj2fNuIhakf8I+sk81/g/J/Jn
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1A32529015B96CEA1FE650830080F3EF8D2E57DB90817E61B8254FE5EDD7A283E5297C6
sha3_384: fdfeca82255579a8113c5f4d4f316be1e3a31dd50397265b7f2077535700f6a21a5683a52f49e96663e067f63c5eb2b9
ep_bytes: 60be00b040008dbe0060ffff5783cdff
timestamp: 2010-03-23 10:39:17

Version Info:

0: [No Data]

Trojan.Agent.AQSK also known as:

BkavW32.Kav32MT20B.Worm
Elasticmalicious (moderate confidence)
MicroWorld-eScanTrojan.Agent.AQSK
FireEyeGeneric.mg.f5e363c286a2483c
CAT-QuickHealTrojanDownloader.Dogrobot.D1
SkyhighBehavesLike.Win32.Ctsinf.fh
McAfeeArtemis!F5E363C286A2
Cylanceunsafe
VIPRETrojan.Agent.AQSK
SangforTrojan.Win32.Save.a
AlibabaWorm:Win32/AntiAV.92f6a591
BitDefenderThetaGen:NN.ZexaF.36802.@mJfaGKt@iji
SymantecTrojan.Dropper
tehtrisGeneric.Malware
ESET-NOD32a variant of Win32/AntiAV.NEZ
APEXMalicious
TrendMicro-HouseCallTROJ_KILLAV.SMW
AvastWin32:GenMaliciousA-TEP [Trj]
ClamAVWin.Malware.Aizb-9945690-0
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderTrojan.Agent.AQSK
NANO-AntivirusTrojan.Win32.Nihem.btwzr
TencentWin32.Trojan.Generic.Lqil
EmsisoftTrojan.Agent.AQSK (B)
F-SecureTrojan.TR/ATRAPS.Gen2
DrWebTrojan.Onedev
ZillyaTrojan.AntiAV.Win32.3117
TrendMicroTROJ_KILLAV.SMW
Trapminemalicious.moderate.ml.score
SophosTroj/KillAV-GQ
IkarusTrojan-Dropper.Win32.Killav
JiangminTrojan/OnLineGames.an
GoogleDetected
AviraTR/ATRAPS.Gen2
VaristW32/Risk.KNWG-8908
Antiy-AVLTrojan[Backdoor]/Win32.Nihem
KingsoftWin32.Trojan.Generic.a
MicrosoftTrojan:Win32/Wacatac.B!ml
XcitiumTrojWare.Win32.NTRootkit.ABC@1vtzmm
ArcabitTrojan.Agent.AQSK
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataTrojan.Agent.AQSK
CynetMalicious (score: 100)
AhnLab-V3Dropper/Win32.Rootkit.C3798
VBA32SScope.Trojan.Sysload.26105
ALYacTrojan.Agent.AQSK
PandaTrj/Genetic.gen
RisingTrojan.Win32.Generic.14402D92 (C64:YzY0OsuTbQHoanf4)
YandexTrojan.GenAsa!EbfuNju6Luk
MAXmalware (ai score=100)
FortinetW32/Mudrop.HNN!tr
AVGWin32:GenMaliciousA-TEP [Trj]
DeepInstinctMALICIOUS
alibabacloudTrojan:Win/AntiAV.NEZ

How to remove Trojan.Agent.AQSK?

Trojan.Agent.AQSK removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment