Trojan

About “Trojan-Downloader.Win32.Upatre.iyzc” infection

Malware Removal

The Trojan-Downloader.Win32.Upatre.iyzc is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Downloader.Win32.Upatre.iyzc virus can do?

  • Sample contains Overlay data
  • Presents an Authenticode digital signature
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • Authenticode signature is invalid
  • Attempts to modify proxy settings
  • Anomalous binary characteristics

How to determine Trojan-Downloader.Win32.Upatre.iyzc?


File Info:

name: 2B749A7C29483F0F8358.mlw
path: /opt/CAPEv2/storage/binaries/89e99cc9200fe9f599d7dea500044db1c735fa69c0dd7df0edde9f88c50119e3
crc32: 123399F8
md5: 2b749a7c29483f0f8358bded0810b3f5
sha1: c7f933de8696f02001bb634cd6f81b1838615fcc
sha256: 89e99cc9200fe9f599d7dea500044db1c735fa69c0dd7df0edde9f88c50119e3
sha512: 59ae844720038e5638e42e16a0ea7ee306bbf922a0ea2f5f411790567269863667412e1bce56165204ee4a7a6169d17f2f2bdab5171b2605e0b12c79f3928f6b
ssdeep: 6144:4pK37S27OZ4wYMEWirl72kT5UCvlqylFhZboiI+Yb:R37F44wjm2O3vlpvkBb
type: PE32+ executable (GUI) x86-64, for MS Windows
tlsh: T1EB847C46F76458F6D567C139CA83978AE7B27C654B20938F02A08B6A3F337A15D3D312
sha3_384: b7e76b4ad593bc5942072e21d3845b6cc03fab0982ad1bb137a0f529af6147f8fcba2ade90f860bd378a9a5576e975c0
ep_bytes: 41555756534881ec48010000488d0d29
timestamp: 2017-10-09 05:24:32

Version Info:

CompanyName: 360.cn
FileDescription: 360安全卫士 系统修复图标扫描模块
FileVersion: 1, 0, 0, 1037
InternalName: 360DeskAna.exe
LegalCopyright: (C) 360.cn Inc. All Rights Reserved.
OriginalFilename: 360DeskAna.exe
ProductName: 360安全卫士
ProductVersion: 1, 0, 0, 1037
Translation: 0x0804 0x04b0

Trojan-Downloader.Win32.Upatre.iyzc also known as:

LionicTrojan.Win32.Upatre.a!c
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKD.37225553
FireEyeTrojan.GenericKD.37225553
ALYacTrojan.GenericKD.37225553
MalwarebytesGeneric.Malware/Suspicious
K7AntiVirusTrojan-Downloader ( 0057f53d1 )
AlibabaTrojanDownloader:Win32/Upatre.708f08df
K7GWTrojan-Downloader ( 0057f53d1 )
Cybereasonmalicious.e8696f
SymantecTrojan.Gen.MBT
ESET-NOD32a variant of Win64/TrojanDownloader.Agent.LA
CynetMalicious (score: 99)
KasperskyTrojan-Downloader.Win32.Upatre.iyzc
BitDefenderTrojan.GenericKD.37225553
AvastWin64:Trojan-gen
TencentWin32.Trojan-Downloader.Upatre.Najl
SophosMal/Generic-S
F-SecureTrojan.TR/Dldr.Agent.ljdmx
VIPRETrojan.GenericKD.37225553
TrendMicroTROJ_GEN.R002C0WDM23
McAfee-GW-EditionArtemis
EmsisoftTrojan.GenericKD.37225553 (B)
IkarusTrojan-Downloader.Win64.Agent
GDataTrojan.GenericKD.37225553
AviraTR/Dldr.Agent.ljdmx
ArcabitTrojan.Generic.D2380451
ZoneAlarmTrojan-Downloader.Win32.Upatre.iyzc
MicrosoftTrojan:Win32/Wacatac.B!ml
GoogleDetected
McAfeeArtemis!2B749A7C2948
MAXmalware (ai score=89)
VBA32TrojanDownloader.Upatre
Cylanceunsafe
PandaTrj/CI.A
TrendMicro-HouseCallTROJ_GEN.R002C0WDM23
RisingDownloader.Agent!8.B23 (CLOUD)
MaxSecureTrojan.Malware.119747478.susgen
FortinetPossibleThreat.MU
AVGWin64:Trojan-gen
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan-Downloader.Win32.Upatre.iyzc?

Trojan-Downloader.Win32.Upatre.iyzc removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment