Trojan

Trojan.Agent.EWSK removal

Malware Removal

The Trojan.Agent.EWSK is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Agent.EWSK virus can do?

  • Sample contains Overlay data
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Performs HTTP requests potentially not found in PCAP.
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • Authenticode signature is invalid
  • Attempts to modify proxy settings
  • Deletes executed files from disk
  • Anomalous binary characteristics

How to determine Trojan.Agent.EWSK?


File Info:

name: 1E43D43F5D0B7AABA341.mlw
path: /opt/CAPEv2/storage/binaries/46ca200ec8790452f610561b99adab7095473b647c1fa89699eaf68b24e84f6a
crc32: 9F3BE889
md5: 1e43d43f5d0b7aaba3415b30b3569667
sha1: 8cf1634833ad87ab1f03b1fbb02728d1916316e4
sha256: 46ca200ec8790452f610561b99adab7095473b647c1fa89699eaf68b24e84f6a
sha512: ed3538ebffb37cbda25162ccd9064b8d5845671eaa7ee856af99308769c74ecbb3009d32332c6045253ece29da537a5d74cd2ea40209fbffbd427b4b4c498c73
ssdeep: 24576:+VBs1yrkEFAraq4PaMBm3mFFLo/0fZsi378kv8MKeXqEgqHPoUsp7mBk+6IsZUs4:uBsrE2gc3mDnYkQuPEN4g/erj8E0jW
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T145851203F293D5B2D9A500B501299BB25F7ABC319774C4E7AFD47A6D8D313E0A73221A
sha3_384: 56ab6f4b630cdf6162735b4174d3e05698cef640459a7462892e5f2b5dea0ca1ba929921b398248e385e639f3228e0e4
ep_bytes: e8a61d0000e989feffff8bff565733f6
timestamp: 2016-02-26 18:08:50

Version Info:

Comments: Created with Setup Factory
FileDescription: Setup Application
FileVersion: 9.5.1.0
InternalName: suf_launch
LegalCopyright: Setup Engine Copyright © 2004-2016 Indigo Rose Corporation
LegalTrademarks: Setup Factory is a trademark of Indigo Rose Corporation.
OriginalFilename: suf_launch.exe
ProductName: Setup Factory Runtime
ProductVersion: 9.5.1.0
Translation: 0x0409 0x04e4

Trojan.Agent.EWSK also known as:

LionicTrojan.Win32.Miner.4!c
MicroWorld-eScanTrojan.Agent.EWSK
FireEyeTrojan.Agent.EWSK
CAT-QuickHealTrojan.Tigger.S16290507
ALYacTrojan.Agent.EWSK
CylanceUnsafe
SangforCoinMiner.Win32.Indiloadz.Vqh2
AlibabaTrojan:Win32/Miner.67b37155
CyrenW32/Indiloadz.E.gen!Eldorado
SymantecTrojan.Gen.MBT
Elasticmalicious (high confidence)
ESET-NOD32Win32/Indiloadz.CC
APEXMalicious
Paloaltogeneric.ml
KasperskyTrojan.Win32.Miner.asxur
BitDefenderTrojan.Agent.EWSK
AvastVBA:Downloader-GJI [Trj]
TencentMalware.Win32.Gencirc.10ce28bd
Ad-AwareTrojan.Agent.EWSK
EmsisoftTrojan.Agent.EWSK (B)
VIPRETrojan.Agent.EWSK
TrendMicroTROJ_GEN.R002C0GJM22
McAfee-GW-EditionBehavesLike.Win32.BadFile.tc
Trapminesuspicious.low.ml.score
SophosMal/Generic-S
GDataTrojan.Agent.EWSK
GoogleDetected
AviraTR/Indiloadz.kweyc
MAXmalware (ai score=89)
ArcabitTrojan.Agent.EWSK
MicrosoftTrojan:Win32/Wacatac.B!ml
CynetMalicious (score: 99)
AhnLab-V3Trojan/Win32.Miner.C4198063
McAfeeArtemis!1E43D43F5D0B
VBA32BScope.Trojan.Ekstak
MalwarebytesAdware.IndiLoadz
TrendMicro-HouseCallTROJ_GEN.R002C0GJM22
RisingTrojan.Indiloadz!8.E2E0 (CLOUD)
YandexTrojan.Indiloadz!Xu3eeD3mnmc
IkarusTrojan-Downloader.LUA.Agent
MaxSecureTrojan.Malware.106976447.susgen
FortinetW32/CoinMiner.KT!tr
AVGVBA:Downloader-GJI [Trj]
PandaTrj/CI.A

How to remove Trojan.Agent.EWSK?

Trojan.Agent.EWSK removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment