Trojan

Should I remove “Trojan.AgentBypass”?

Malware Removal

The Trojan.AgentBypass is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.AgentBypass virus can do?

  • Sample contains Overlay data
  • Reads data out of its own binary image
  • The binary contains an unknown PE section name indicative of packing
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan.AgentBypass?


File Info:

name: 66878703BE6D9BDC2EC7.mlw
path: /opt/CAPEv2/storage/binaries/9e76766d892cc53d7165f12914be59d511a066b084ec550f8c4965a03bb0b117
crc32: 5FCB30BB
md5: 66878703be6d9bdc2ec7b124f66029fe
sha1: a43fab41d193b33cc24b027a192bb47fd0edd51e
sha256: 9e76766d892cc53d7165f12914be59d511a066b084ec550f8c4965a03bb0b117
sha512: 92afdee21e18e14bdd34f09da910208370da0d83ba3ebe6dfd222fd028594d57f7872f7a2ab98406890ff977a04314fad04aa4cfd1b8720a8ad063d6ac161ebd
ssdeep: 12288:sNzyGwUPvkHuQqwEopJF1gL5pRTcAkS/3hzN8qE43fm78V7:sNrwUPcOQqwEkJs5jcAkSYqyE7
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T196053A16F67486B5D073C0B9C9D2A69AEB7234550B308ADF1285C3782F277E68D3A731
sha3_384: bb065f9605990a3caa21f2e4a5e9ecb0aa0bbfbc66ed2fa1f65f51214170f77d9bf8e784adecf981cbaf9a25642c789b
ep_bytes: 558bec83c4f0b838464000e874e2ffff
timestamp: 1992-06-19 22:22:17

Version Info:

0: [No Data]

Trojan.AgentBypass also known as:

BkavW32.AIDetectMalware
LionicWorm.Win32.Delf.trRk
Elasticmalicious (moderate confidence)
DrWebWin32.HLLW.Kazaa.924
MicroWorld-eScanTrojan.Agent.EICV
ClamAVWin.Virus.Wapomi-9623880-0
FireEyeGeneric.mg.66878703be6d9bdc
CAT-QuickHealTrojan.AgentBypass
ALYacTrojan.Agent.EICV
MalwarebytesGeneric.Malware.AI.DDS
VIPRETrojan.Agent.EICV
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 004bcce41 )
K7GWTrojan ( 004bcce41 )
Cybereasonmalicious.1d193b
BitDefenderThetaGen:NN.ZelphiF.36722.ZmZ@a0C2bxn
CyrenW32/Aple.A.gen!Eldorado
SymantecW32.SillyP2P
tehtrisGeneric.Malware
ESET-NOD32Win32/Delf.NAY
APEXMalicious
CynetMalicious (score: 100)
KasperskyP2P-Worm.Win32.Delf.aj
BitDefenderTrojan.Agent.EICV
NANO-AntivirusTrojan.Win32.Delf.oxkq
AvastWin32:Delf-SVI [Trj]
TencentVirus.Win32.Lamer.fh
EmsisoftTrojan.Agent.EICV (B)
F-SecureTrojan.TR/Dropper.Gen
BaiduWin32.Virus.Lamer.f
ZillyaWorm.Delf.Win32.3450
TrendMicroTROJ_AGENT_005911.TOMB
McAfee-GW-EditionBehavesLike.Win32.Generic.cm
Trapminemalicious.high.ml.score
SophosW32/BagarBu-A
SentinelOneStatic AI – Malicious PE
GDataTrojan.Agent.EICV
JiangminWorm/Delf.vm
WebrootW32.Worm.Gen
AviraTR/Dropper.Gen
MAXmalware (ai score=89)
Antiy-AVLVirus/Win32.BagarBubba.a
Kingsoftmalware.kb.b.999
XcitiumTrojWare.Win32.Pincav.AV@2rw0ny
ArcabitTrojan.Agent.EICV
ZoneAlarmP2P-Worm.Win32.Delf.aj
MicrosoftTrojan:Win32/AgentBypass!pz
GoogleDetected
AhnLab-V3Worm/Win32.Delf.R119214
Acronissuspicious
McAfeeW32/HLLP.11042.gen
VBA32Worm.Delf
Cylanceunsafe
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_AGENT_005911.TOMB
RisingWorm.P2p.Win32.Delf.bn (CLASSIC)
YandexTrojan.GenAsa!HYSjiRN/8Mk
IkarusWorm.Win32.Eggnog
MaxSecureVirus.W32.Lamer.FG
FortinetW32/Aple.A
AVGWin32:Delf-SVI [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan.AgentBypass?

Trojan.AgentBypass removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment