Trojan

Trojan-Downloader.Win32.Upatre.ihec removal tips

Malware Removal

The Trojan-Downloader.Win32.Upatre.ihec is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Downloader.Win32.Upatre.ihec virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Attempts to connect to a dead IP:Port (5 unique times)
  • A process created a hidden window
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Checks for the presence of known windows from debuggers and forensic tools
  • Network activity contains more than one unique useragent.
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • Detects VirtualBox through the presence of a registry key
  • Attempts to modify proxy settings
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz
gg-clean.hk
iplogger.org
apps.identrust.com

How to determine Trojan-Downloader.Win32.Upatre.ihec?


File Info:

crc32: 33AC9500
md5: 0304781422f0d67eef4e7ed04027c439
name: kiskis.exe
sha1: 9681b6ebaca5f4c0e9b2579b8f55eb519114fc69
sha256: b62e5ef722135d06e2fe63134da25e675007d68a6ef86d9df774eaf7fdc98676
sha512: 784f58b69fbf967776522d736d5ab2cc82443befca325f51610b3d3c8b8c0d41713eb96f58d526649d574e3c849eae89cdffd70b2c0ad8d9bc0266c29e988984
ssdeep: 6144:wBOhpuDUZXq9flhoSNB751JNPxo+bZo+XxVCh2:oDkXoESNR5zl2+Z0Q
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

Translation: 0x0219 0x04e4

Trojan-Downloader.Win32.Upatre.ihec also known as:

MicroWorld-eScanTrojan.GenericKD.32771717
FireEyeGeneric.mg.0304781422f0d67e
McAfeeTrojan-FRQV!0304781422F0
ALYacTrojan.GenericKD.32771717
MalwarebytesTrojan.MalPack.GS
SangforMalware
K7AntiVirusTrojan ( 003c36381 )
BitDefenderTrojan.GenericKD.32771717
K7GWTrojan ( 003c36381 )
Cybereasonmalicious.baca5f
BitDefenderThetaGen:NN.ZexaF.32517.ru0@aa1DVhj
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.GYYQ
TrendMicro-HouseCallTROJ_GEN.R002H0CKU19
GDataTrojan.GenericKD.32771717
KasperskyTrojan-Downloader.Win32.Upatre.ihec
AlibabaTrojanDownloader:Win32/Upatre.404020f9
AegisLabTrojan.Win32.Upatre.a!c
RisingTrojan.Wacatac!8.10C01 (TFE:5:1n5cvSL0o1M)
Endgamemalicious (high confidence)
F-SecureTrojan.TR/AD.Chapak.bojqp
DrWebTrojan.Siggen8.58982
Invinceaheuristic
McAfee-GW-EditionBehavesLike.Win32.MultiPlug.dc
SentinelOneDFI – Malicious PE
Trapminemalicious.moderate.ml.score
SophosMal/Generic-S
APEXMalicious
JiangminTrojanDownloader.Bandit.ayc
AviraTR/AD.Chapak.bojqp
ArcabitTrojan.Generic.D1F40E85
AhnLab-V3Trojan/Win32.MalPe.R301700
ZoneAlarmTrojan-Downloader.Win32.Upatre.ihec
MicrosoftTrojan:Win32/GandCrypt.GE!MTB
Acronissuspicious
VBA32Malware-Cryptor.Limpopo
MAXmalware (ai score=80)
Ad-AwareTrojan.GenericKD.32771717
CylanceUnsafe
PandaGeneric Malware
IkarusTrojan.Win32.Crypt
FortinetW32/Kryptik.GYYN!tr
AVGFileRepMalware
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_100% (W)
Qihoo-360HEUR/QVM10.2.9747.Malware.Gen

How to remove Trojan-Downloader.Win32.Upatre.ihec?

Trojan-Downloader.Win32.Upatre.ihec removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment