Trojan

About “Trojan.APosT” infection

Malware Removal

The Trojan.APosT is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.APosT virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Creates RWX memory
  • Starts servers listening on 0.0.0.0:13141
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Executed a process and injected code into it, probably while unpacking
  • Deletes its original binary from disk
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • Anomalous binary characteristics

Related domains:

r.nxxxn.ga
fuck88.f3322.net

How to determine Trojan.APosT?


File Info:

crc32: CB141D6D
md5: e46349f764ac2eacab2e2ef9df404ebe
name: SQLamd.exe
sha1: 2f669d695e128ba89102f6490830d58c28d839b6
sha256: 56cb6050b9ebbccc68812dcf56aa35b9536348ea92bca4a42f0fe5df9272a5c3
sha512: 7cad5df9d88bb4becec136f3c259f960f8a8211200c5acec23fa60ae31b32327e76e4bdc323c29d03b166eba74b2d96354b98d1b743ce65343083fbd35b4b43e
ssdeep: 24576:8vdSuGEeNqGed+HmomnY/g3EGtjlwMnU0e5cxitwZKHAeGVFoFRDOR:819reNqGeoHmD6qEaZwMkcxitSKSzcR
type: MS-DOS executable, MZ for MS-DOS

Version Info:

LegalCopyright: x7248x6743x6240x6709 (C) 2004
InternalName: calculator
FileVersion: 1, 0, 0, 1
ProductName: calculator x5e94x7528x7a0bx5e8f
ProductVersion: 1, 0, 0, 1
FileDescription: calculator Microsoft x57fax7840x7c7bx5e94x7528x7a0bx5e8f
OriginalFilename: calculator.EXE
Translation: 0x0804 0x04b0

Trojan.APosT also known as:

MicroWorld-eScanTrojan.GenericKDZ.57545
FireEyeGeneric.mg.e46349f764ac2eac
CAT-QuickHealBackdoor.ZegostPMF.S11118811
Qihoo-360HEUR/QVM18.1.F6A3.Malware.Gen
ALYacTrojan.GenericKDZ.57545
CylanceUnsafe
ZillyaTrojan.Kryptik.Win32.1929328
K7AntiVirusTrojan ( 005343d71 )
BitDefenderTrojan.GenericKDZ.57545
K7GWTrojan ( 005343d71 )
SymantecML.Attribute.HighConfidence
APEXMalicious
GDataTrojan.GenericKDZ.57545
KasperskyHEUR:Trojan.Win32.Generic
TencentMalware.Win32.Gencirc.10b8c293
Ad-AwareTrojan.GenericKDZ.57545
ComodoBackdoor.Win32.Zegost.XP@7o7w19
F-SecureTrojan.TR/Crypt.Agent.alaku
DrWebBackDoor.BlackMoon.15
VIPRETrojan.Win32.Generic!BT
Invinceaheuristic
McAfee-GW-EditionBehavesLike.Win32.Emotet.tc
Trapminemalicious.high.ml.score
CMCVirus.Win32.Sality!O
EmsisoftTrojan.GenericKDZ.57545 (B)
JiangminBackdoor.Farfli.ckm
AviraTR/Crypt.Agent.alaku
MAXmalware (ai score=89)
Endgamemalicious (high confidence)
ArcabitTrojan.Generic.DE0C9
ZoneAlarmHEUR:Trojan.Win32.Generic
MicrosoftTrojan:Win32/Wacatac.D!ml
AhnLab-V3Malware/Win32.Generic.C3403195
Acronissuspicious
McAfeeGenericRXAA-AA!E46349F764AC
VBA32Trojan.APosT
ESET-NOD32a variant of Win32/Kryptik.GGXP
RisingTrojan.Kryptik!8.8 (RDMK:cmRtazoXhNiRQBqrSLJab+5HDJwv)
YandexTrojan.Agent!KcomIKNn7Jk
SentinelOneDFI – Suspicious PE
eGambitUnsafe.AI_Score_98%
FortinetW32/Kryptik.GGXP!tr
BitDefenderThetaGen:NN.ZexaF.34100.enuaaKuRHIpj
AVGWin32:Malware-gen
AvastWin32:Malware-gen

How to remove Trojan.APosT?

Trojan.APosT removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment