Trojan

Trojan-Dropper.Win32.Agent.tettsq removal instruction

Malware Removal

The Trojan-Dropper.Win32.Agent.tettsq is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Dropper.Win32.Agent.tettsq virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Executed a command line with /C or /R argument to terminate command shell on completion which can be used to hide execution
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Executed a very long command line or script command which may be indicative of chained commands or obfuscation
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • A scripting utility was executed
  • A ping command was executed with the -n argument possibly to delay analysis
  • Uses Windows utilities for basic functionality
  • Uses Windows utilities for basic functionality
  • Detects VirtualBox using WNetGetProviderName trick
  • Installs itself for autorun at Windows startup
  • Checks the version of Bios, possibly for anti-virtualization
  • Appears to use command line obfuscation
  • A script or command line contains a long continuous string indicative of obfuscation
  • Attempts to disable Windows Defender
  • Attempts to execute suspicious powershell command arguments
  • Uses suspicious command line tools or Windows utilities

Related domains:

wpad.local-net

How to determine Trojan-Dropper.Win32.Agent.tettsq?


File Info:

name: 16D1CDD204C2E651EF20.mlw
path: /opt/CAPEv2/storage/binaries/7b9468e374cca47c96340f8601fdc88bb45c4c6aef13c804ab375470cfbbbd65
crc32: 5ACBEA97
md5: 16d1cdd204c2e651ef200388a1898088
sha1: 85de52cab71dd4cb17fae0311b138ed20bfca7a3
sha256: 7b9468e374cca47c96340f8601fdc88bb45c4c6aef13c804ab375470cfbbbd65
sha512: 2286a7886a307e858884edda621faad17fa0ad3ba6f2367c8f8685d563939e3c1308e77619d2de1652060928b312d9e0431e89439b16a6f5137aaf16c8c289de
ssdeep: 196608:91OKyBbdLBFTrpcHTuuuU/6/VhHl2DnVhy0d2s7ia5oK:3ObBbdt5GHeU/YFahy0dlzWK
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T17B663322B6F0C9FBD9DD91310B2E27C181FAD1184C39887377490F3E9FAB886E559526
sha3_384: 45f259f887823d1d108c2cee55e7166d96925b4c1751bdbd0d815b8d798b70c9d68954e78ab21d4305892a49416f1ceb
ep_bytes: 558bec6aff68e0b94100682c4a410064
timestamp: 2010-11-18 16:27:35

Version Info:

CompanyName: Igor Pavlov
FileDescription: 7z Setup SFX
FileVersion: 9.20
InternalName: 7zS.sfx
LegalCopyright: Copyright (c) 1999-2010 Igor Pavlov
OriginalFilename: 7zS.sfx.exe
ProductName: 7-Zip
ProductVersion: 9.20
Translation: 0x0409 0x04b0

Trojan-Dropper.Win32.Agent.tettsq also known as:

Elasticmalicious (high confidence)
DrWebTrojan.MulDrop18.60088
MicroWorld-eScanGen:Variant.Jaik.48175
FireEyeGen:Variant.Jaik.48175
ALYacGen:Variant.Jaik.48175
CylanceUnsafe
AlibabaAdWare:Win32/Neoreklami.34a54677
BitDefenderThetaGen:NN.ZexaF.34294.@JW@a4HxTVn
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Adware.Neoreklami.LI
TrendMicro-HouseCallTROJ_GEN.R002H07KL21
Paloaltogeneric.ml
KasperskyTrojan-Dropper.Win32.Agent.tettsq
BitDefenderGen:Variant.Jaik.48175
AvastWin32:Adware-gen [Adw]
TencentWin32.Trojan-dropper.Agent.Eadt
Ad-AwareGen:Variant.Jaik.48175
EmsisoftGen:Variant.Jaik.48175 (B)
TrendMicroTROJ_GEN.R002C0WKL21
McAfee-GW-EditionBehavesLike.Win32.BadFile.vc
SophosGeneric PUA IF (PUA)
SentinelOneStatic AI – Malicious SFX
GDataGen:Variant.Jaik.48175
JiangminAdware.Agent.atbl
AviraHEUR/AGEN.1140578
MAXmalware (ai score=89)
Antiy-AVLTrojan/Generic.ASMalwS.34D3CA7
MicrosoftTrojan:Win32/Sabsik.TE.B!ml
CynetMalicious (score: 100)
McAfeeArtemis!16D1CDD204C2
VBA32TrojanDropper.Agent
MalwarebytesAdware.Neoreklami
APEXMalicious
RisingMalware.Heuristic!ET#90% (RDMK:cmRtazrAsgPXZuZgQF2v506K7NrK)
YandexTrojan.DR.Agent!CnjbJtyuZXs
IkarusPUA.Neoreklami
eGambitUnsafe.AI_Score_99%
FortinetAdware/Neoreklami
AVGWin32:Adware-gen [Adw]

How to remove Trojan-Dropper.Win32.Agent.tettsq?

Trojan-Dropper.Win32.Agent.tettsq removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment