Trojan

Should I remove “Trojan.Delf.Agent.KR”?

Malware Removal

The Trojan.Delf.Agent.KR is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Delf.Agent.KR virus can do?

  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Creates RWX memory
  • A process created a hidden window
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Uses Windows utilities for basic functionality
  • Executed a process and injected code into it, probably while unpacking
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • Creates a copy of itself
  • Anomalous binary characteristics

Related domains:

2no.co

How to determine Trojan.Delf.Agent.KR?


File Info:

crc32: 28EEC830
md5: c92cd43eb2689b23d25ccb76bdb58708
name: cluysd54.exe
sha1: ea5b472997ffd50a7de2e30ded2466401ff32d46
sha256: 70e1df2f0be2fb69f32fcaf78c05033378e8cfd6ef81d6c59e8bf86579fa7099
sha512: 9ae698140c64ce95ddad8a5fa36a2272a6d8f7d941db3c97ac7d438ddf2eca83fb9b6d57350ca1bbc71b5e500064dbb5becbe06f33792f9334a2eb8aeea036ed
ssdeep: 6144:/rCpJBOp0/gTR8aYjQu/wWbJc/5iJXLC29EsQbZX033EM3O2c7YpI1aEWjT4Ko:/r8LKu3jRqRit5yCEM3D6z18Ho
type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed

Version Info:

0: [No Data]

Trojan.Delf.Agent.KR also known as:

MicroWorld-eScanTrojan.Delf.Agent.KR
CAT-QuickHealTrojan.Delpem
Qihoo-360Win32/Trojan.469
McAfeeArtemis!C92CD43EB268
CylanceUnsafe
SangforMalware
K7AntiVirusTrojan ( 0053cbe31 )
BitDefenderTrojan.Delf.Agent.KR
K7GWTrojan ( 0053cbe31 )
CrowdStrikewin/malicious_confidence_80% (W)
TrendMicroTSPY_FAREIT.THAOOAAH
F-ProtW32/Trojan3.ANAD
SymantecTrojan.Gen.2
APEXMalicious
AvastWin32:Trojan-gen
GDataTrojan.Delf.Agent.KR
KasperskyHEUR:Trojan.Win32.Kryptik.gen
AlibabaTrojan:Win32/Delpem.52fdda76
NANO-AntivirusTrojan.Win32.Kryptik.fhxnmf
AegisLabTrojan.Win32.Generic.4!c
RisingTrojan.Injector!1.AFE3 (CLOUD)
Endgamemalicious (moderate confidence)
EmsisoftTrojan.Delf.Agent.KR (B)
ComodoTrojWare.Win32.Spy.Noon.DS@84htrf
F-SecureHeuristic.HEUR/AGEN.1035204
DrWebTrojan.PWS.Spy.20987
ZillyaTrojan.Kryptik.Win32.1490968
Invinceaheuristic
McAfee-GW-EditionBehavesLike.Win32.Fareit.fc
Trapminemalicious.moderate.ml.score
FireEyeGeneric.mg.c92cd43eb2689b23
SophosMal/Fareit-Q
IkarusTrojan.Win32.Injector
CyrenW32/Trojan.LJLI-2518
JiangminTrojan.Kryptik.oi
WebrootW32.Trojan.Agent.Gen
AviraHEUR/AGEN.1035204
MAXmalware (ai score=99)
Antiy-AVLTrojan/Win32.Kryptik
ArcabitTrojan.Delf.Agent.KR
ZoneAlarmHEUR:Trojan.Win32.Kryptik.gen
MicrosoftTrojan:Win32/Occamy.C
AhnLab-V3Trojan/Win32.Trojanspy.C2687652
Acronissuspicious
VBA32TScope.Trojan.Delf
ALYacTrojan.Delf.Agent.KR
Ad-AwareTrojan.Delf.Agent.KR
MalwarebytesSpyware.LokiBot
PandaTrj/GdSda.A
ZonerTrojan.Win32.71887
ESET-NOD32a variant of Win32/Injector.EANJ
TrendMicro-HouseCallTSPY_FAREIT.THAOOAAH
TencentWin32.Trojan.Kryptik.Sxoe
YandexTrojan.Kryptik!LZYuiGwdrWs
SentinelOneDFI – Malicious PE
FortinetW32/Injector.EDUW!tr
BitDefenderThetaGen:NN.ZelphiF.34090.wmGfaupXVOoi
AVGFileRepMalware
Cybereasonmalicious.eb2689
Paloaltogeneric.ml
MaxSecureTrojan.Malware.73736783.susgen

How to remove Trojan.Delf.Agent.KR?

Trojan.Delf.Agent.KR removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment