Categories: Trojan

What is “Trojan.BitCoinMiner.VSH”?

The Trojan.BitCoinMiner.VSH is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.BitCoinMiner.VSH virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (2 unique times)
  • Creates RWX memory
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Unconventionial language used in binary resources: Russian
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Deletes its original binary from disk
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • Creates a copy of itself
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz
minerlot.com
iplogger.co

How to determine Trojan.BitCoinMiner.VSH?


File Info:

crc32: EB9777ADmd5: 74f4b3650495aabffd55a1eea666e45bname: 74F4B3650495AABFFD55A1EEA666E45B.mlwsha1: d35911664af1eab35e0cef7f678cc74b1991ba91sha256: 237412891317c48142f8a552fe5e650c89637fcb63290da85da15094c4a36e78sha512: 03a1bbf88377a75735c75b2b25e7804cc42dcf4b1a3c2ac9c0623bc059949ae6235ff9df3efaf4868da1e6f400aa63e8fef4d674ae2df6333fe476fd3c3467e2ssdeep: 24576:ab+lzhfn2F0PX7MDNWB9jwJVGeUpc1tjYl0etysiWUiZylWXtXI/RhH:pj2yPLOAnjheBrjJI6hkZ8type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

InternalName: pusherFileVersion: 7.35.0.6131OriginalFilename: pusher.exeProductVersion: 7.35.0.6131Translation: 0x0409 0x04b0

Trojan.BitCoinMiner.VSH also known as:

K7AntiVirus Trojan ( 0052336c1 )
Elastic malicious (high confidence)
DrWeb Trojan.Vittalia.13885
Cynet Malicious (score: 100)
CAT-QuickHeal Trojan.BitMiner.S1751202
ALYac Trojan.BitCoinMiner.DQ
Cylance Unsafe
Zillya Trojan.Kryptik.Win32.1363907
CrowdStrike win/malicious_confidence_70% (D)
K7GW Trojan ( 00520ecc1 )
Cybereason malicious.50495a
Cyren W32/Trojan.BRO.gen!Eldorado
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/Kryptik.GARJ
APEX Malicious
Avast Win32:Malware-gen
Kaspersky UDS:DangerousObject.Multi.Generic
BitDefender Trojan.BitCoinMiner.DQ
NANO-Antivirus Riskware.Win32.Vittalia.ewehqf
MicroWorld-eScan Trojan.BitCoinMiner.DQ
Tencent Malware.Win32.Gencirc.10b54e50
Ad-Aware Trojan.BitCoinMiner.DQ
Sophos Mal/Generic-S
Comodo Application.Win32.ICLoader.B@8hjrzn
VIPRE Trojan.Win32.Generic!BT
TrendMicro TROJ_KRYPTIK_HA010043.UVPM
McAfee-GW-Edition BehavesLike.Win32.Adware.tc
FireEye Generic.mg.74f4b3650495aabf
Emsisoft Trojan.BitCoinMiner.DQ (B)
SentinelOne Static AI – Malicious PE
Jiangmin Trojan.Ekstak.dym
Avira HEUR/AGEN.1110897
eGambit Unsafe.AI_Score_99%
Antiy-AVL Trojan/Generic.ASMalwS.24112E7
Microsoft Trojan:Win32/Ekstak.CC!MTB
Arcabit Trojan.BitCoinMiner.DQ
GData Trojan.BitCoinMiner.DQ
TACHYON Trojan/W32.Ekstak.1564672.G
AhnLab-V3 Trojan/Win32.Ekstak.R216417
Acronis suspicious
McAfee Trojan-FOUZ!74F4B3650495
MAX malware (ai score=100)
VBA32 Trojan.Ekstak
Malwarebytes Trojan.BitCoinMiner.VSH
Panda Trj/Genetic.gen
TrendMicro-HouseCall TROJ_KRYPTIK_HA010043.UVPM
Rising Malware.Obscure/Heur!1.A89F (CLASSIC)
Yandex Trojan.GenAsa!qwwPlk7A1+w
Ikarus Trojan.Win32.CoinMiner
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/Kryptik.GARJ!tr
AVG Win32:Malware-gen
Paloalto generic.ml

How to remove Trojan.BitCoinMiner.VSH?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

MSIL/GenKryptik.GXIZ information

The MSIL/GenKryptik.GXIZ is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago

Malware.AI.2789448175 (file analysis)

The Malware.AI.2789448175 is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago

Jalapeno.1878 removal instruction

The Jalapeno.1878 is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago

What is “Trojan.Heur3.LPT.YmKfaKBcBekib”?

The Trojan.Heur3.LPT.YmKfaKBcBekib is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago

How to remove “Worm.Win32.Vobfus.exmt”?

The Worm.Win32.Vobfus.exmt is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago

About “TrojanDownloader:Win32/Beebone.JO” infection

The TrojanDownloader:Win32/Beebone.JO is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago