Trojan

Trojan.Benban removal instruction

Malware Removal

The Trojan.Benban is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Benban virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Performs HTTP requests potentially not found in PCAP.
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Attempts to modify proxy settings
  • Touches a file containing cookies, possibly for information gathering
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan.Benban?


File Info:

name: B08B93BAFCBE1C5C4E56.mlw
path: /opt/CAPEv2/storage/binaries/303911f692d426d50e911a74bd729d24886267629a5a238acf199498c034ee37
crc32: AF2ED415
md5: b08b93bafcbe1c5c4e568e34bb44194e
sha1: 5f832e1c79bd2db7e2f10d18974467fd34970882
sha256: 303911f692d426d50e911a74bd729d24886267629a5a238acf199498c034ee37
sha512: ab43345548091241e7884e844a9eb9eb4fec5a99c63b95751154ccddc5fd7ab9071e45c878962a073ae8e293e6c6010e7a58a1744ed62220aeb159eac5e4dfbb
ssdeep: 98304:JjNiYJ1v3hGEs/L+1wn+LdH5eBUtwuXnuR:JjL3v3hGyHMBkwmnuR
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1B4F5BF07FAC288B3D645143005B71735BB75E7621A26DFA3E3A4FDB43D12221AA672CD
sha3_384: 9a9fc13477da6fdc96827b40e9c075717c606e2add1ed15a8ebc29bde9761c0914bf8919466e8cda3db2a201346bb02a
ep_bytes: 558bec6aff68c0886d006844e2520064
timestamp: 2012-11-02 14:16:48

Version Info:

0: [No Data]

Trojan.Benban also known as:

BkavW32.AIDetectMalware
tehtrisGeneric.Malware
MicroWorld-eScanTrojan.GenericKD.70447841
FireEyeGeneric.mg.b08b93bafcbe1c5c
SkyhighBehavesLike.Win32.Generic.wh
McAfeeGenericRXAA-AA!B08B93BAFCBE
MalwarebytesGeneric.Malware.AI.DDS
K7AntiVirusRiskware ( 0040eff71 )
K7GWRiskware ( 0040eff71 )
Cybereasonmalicious.c79bd2
ArcabitTrojan.Generic.D432F2E1
BaiduWin32.Trojan.Benban.a
VirITTrojan.Win32.Generic.BGIZ
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/FlyStudio.Injector.A potentially unwanted
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Trojan.Benban-9840578-0
Kasperskynot-a-virus:AdWare.Win32.Agent.gen
BitDefenderTrojan.GenericKD.70447841
NANO-AntivirusTrojan.Win32.Benban.cvywat
AvastWin32:Malware-gen
TencentMalware.Win32.Gencirc.11b901e6
SophosGeneric ML PUA (PUA)
DrWebTrojan.Click3.9712
VIPRETrojan.GenericKD.70447841
EmsisoftTrojan.GenericKD.70447841 (B)
IkarusTrojan.Generic33.BGIZ
JiangminAdware.Agent.ajby
VaristW32/Trojan.CLL.gen!Eldorado
Antiy-AVLTrojan/Win32.FlyStudio.a
Kingsoftmalware.kb.a.999
XcitiumTrojWare.Win32.Agent.OSCF@5rs7jr
MicrosoftProgram:Win32/Wacapew.C!ml
ZoneAlarmnot-a-virus:AdWare.Win32.Agent.gen
GDataWin32.Trojan.PSE.1S437JY
GoogleDetected
BitDefenderThetaGen:NN.ZexaF.36792.mtX@aiYEMmgb
ALYacTrojan.GenericKD.70447841
MAXmalware (ai score=83)
VBA32Trojan.Benban
Cylanceunsafe
PandaTrj/Genetic.gen
YandexTrojan.GenAsa!ETh1IqnVoKE
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/CoinMiner.PHP!tr
AVGWin32:Malware-gen
DeepInstinctMALICIOUS

How to remove Trojan.Benban?

Trojan.Benban removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment