Trojan

Trojan.Agent.CEOZ removal guide

Malware Removal

The Trojan.Agent.CEOZ is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Agent.CEOZ virus can do?

  • Sample contains Overlay data
  • Presents an Authenticode digital signature
  • Reads data out of its own binary image
  • Unconventionial language used in binary resources: Russian
  • Uses Windows utilities to enumerate running processes
  • Authenticode signature is invalid
  • A scripting utility was executed
  • Uses Windows utilities for basic functionality
  • Uses Windows utilities for basic functionality
  • Behavioural detection: Transacted Hollowing
  • Detects Bochs through the presence of a registry key
  • Checks the version of Bios, possibly for anti-virtualization
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Collects information to fingerprint the system
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities
  • Suspicious wmic.exe use was detected

How to determine Trojan.Agent.CEOZ?


File Info:

name: DF5D67A0BDB045D67264.mlw
path: /opt/CAPEv2/storage/binaries/0ff5958c574131a933e0c4b7ac9df5850f8fe606e9d1b1011ed33218c17029c0
crc32: 0A106E3C
md5: df5d67a0bdb045d67264f22b7b6e0fa4
sha1: 29428d2acea85f64d3ed80ff7b0ae4d2c938d51d
sha256: 0ff5958c574131a933e0c4b7ac9df5850f8fe606e9d1b1011ed33218c17029c0
sha512: e6303fdf9f6df2c9fffbe6066dc4be1d9680d9f746b265568367286952206e51a262d1d4d9f14e86e609b5f704179944410e5c6bdb2456e483f66ae65a55d4de
ssdeep: 12288:rXwOrReFWQFvU65S65VGxoTwEzr9VhURFVBc3nkUK:rXwOrRsLUkzuuTXvhU1oI
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T152A412027BE5C4F5D0A612B058C97BB21CBAFB750B098AD39B905D0B5F707D1A73A386
sha3_384: cac364b07bb5740e2a6a0c6ead7f107d021de10effb1cd37b20075c227102388f367a9d8910369daaafc3a1eb533996b
ep_bytes: 558bec6aff6870c4410068c095410064
timestamp: 2012-12-31 00:38:51

Version Info:

CompanyName: Microsoft Corporation
FileDescription: CertUtil.exe
FileVersion: 6.1.7600.16385 (win7_rtm.090713-1255)
InternalName: CertUtil.exe
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFilename: CertUtil.exe
ProductName: Microsoft® Windows® Operating System
ProductVersion: 6.1.7600.16385
Translation: 0x0409 0x04b0

Trojan.Agent.CEOZ also known as:

BkavW32.AIDetect.malware2
CynetMalicious (score: 99)
FireEyeTrojan.Agent.CEOZ
Cybereasonmalicious.0bdb04
CyrenBAT/Agent.AJX
Elasticmalicious (high confidence)
ESET-NOD32BAT/Agent.NEH
ClamAVWin.Malware.Pterodo-7150799-1
KasperskyTrojan.Win32.Agentb.btnh
BitDefenderTrojan.Agent.CEOZ
MicroWorld-eScanTrojan.Agent.CEOZ
AvastSFX:Agent-AP [Trj]
Ad-AwareTrojan.Agent.CEOZ
EmsisoftTrojan.Agent.CEOZ (B)
ComodoMalware@#2342fph7qy7y9
DrWebTrojan.MulDrop7.19104
VIPRETrojan.Agent.CEOZ
SentinelOneStatic AI – Suspicious PE
AviraHEUR/AGEN.1227137
MicrosoftTrojan:Win32/Wacatac.B!ml
ArcabitTrojan.Agent.CEOZ
ZoneAlarmTrojan.Win32.Agentb.btnh
GDataTrojan.Agent.CEOZ
GoogleDetected
AhnLab-V3Malware/Win32.Generic.C2030343
ALYacTrojan.Agent.CEOZ
MAXmalware (ai score=81)
MalwarebytesMalware.AI.3997535622
IkarusWorm.BAT.Agent
AVGSFX:Agent-AP [Trj]
CrowdStrikewin/malicious_confidence_60% (D)

How to remove Trojan.Agent.CEOZ?

Trojan.Agent.CEOZ removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment