Trojan

Trojan-Dropper.Win32.Agent.tetypq removal

Malware Removal

The Trojan-Dropper.Win32.Agent.tetypq is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Dropper.Win32.Agent.tetypq virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Executed a command line with /C or /R argument to terminate command shell on completion which can be used to hide execution
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Executed a very long command line or script command which may be indicative of chained commands or obfuscation
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • A scripting utility was executed
  • Uses Windows utilities for basic functionality
  • Uses Windows utilities for basic functionality
  • Detects VirtualBox using WNetGetProviderName trick
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • Checks the version of Bios, possibly for anti-virtualization
  • Appears to use command line obfuscation
  • A script or command line contains a long continuous string indicative of obfuscation
  • Attempts to disable Windows Defender
  • Attempts to execute suspicious powershell command arguments
  • Uses suspicious command line tools or Windows utilities

How to determine Trojan-Dropper.Win32.Agent.tetypq?


File Info:

name: A6BC6F3894F59D906994.mlw
path: /opt/CAPEv2/storage/binaries/807b090a55c71ea3e6aa81f378b37207d9c858f6aaa562cd8f5eff1a9347d4cf
crc32: 7CAE6C81
md5: a6bc6f3894f59d906994620b1fbe0258
sha1: 00b1388005eaadefcca9c57197cf52bdd02f1f93
sha256: 807b090a55c71ea3e6aa81f378b37207d9c858f6aaa562cd8f5eff1a9347d4cf
sha512: 9218597718a523e26cb1407802ac95e3511ff892d2879b392b4c36a2a8ab8658389b701aaad57c45c0660bdcb4b2818ab550b31012842d4b0c09e1e08169b26b
ssdeep: 196608:91OJ0GiwNoApoTmcjTLmLrwcKG/K0pSUpMBoi0ib:3O2GvfpH2T6Lrw2x1W508
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1F55633153AE1CAB5CB965EF4D8BE6B5DB028C35409F0C23367C1CF1E09499ABC368E61
sha3_384: 668725ecf1eb8e1bc1c700a864bdc02d4fccbbd02534dfea16fbc97eb6d8a38d86928637bf33fa92e73cfbc79da01c5e
ep_bytes: 558bec6aff68e0b94100682c4a410064
timestamp: 2010-11-18 16:27:35

Version Info:

CompanyName: Igor Pavlov
FileDescription: 7z Setup SFX
FileVersion: 9.20
InternalName: 7zS.sfx
LegalCopyright: Copyright (c) 1999-2010 Igor Pavlov
OriginalFilename: 7zS.sfx.exe
ProductName: 7-Zip
ProductVersion: 9.20
Translation: 0x0409 0x04b0

Trojan-Dropper.Win32.Agent.tetypq also known as:

LionicTrojan.Win32.Agent.b!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Jaik.48175
FireEyeGen:Variant.Jaik.48175
CAT-QuickHealTrojan.IGENERIC
ALYacGen:Variant.Jaik.48175
MalwarebytesAdware.Neoreklami
K7AntiVirusAdware ( 0058c9301 )
AlibabaAdWare:Win32/Neoreklami.77fb0388
K7GWAdware ( 0058c9301 )
Cybereasonmalicious.894f59
BitDefenderThetaGen:NN.ZexaF.34182.@NW@aO78xAj
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Adware.Neoreklami.LP
APEXMalicious
Paloaltogeneric.ml
CynetMalicious (score: 100)
KasperskyTrojan-Dropper.Win32.Agent.tetypq
BitDefenderGen:Variant.Jaik.48175
TencentWin32.Trojan-dropper.Agent.Lnya
DrWebTrojan.MulDrop19.26868
TrendMicroTROJ_GEN.R002C0WAP22
SophosGeneric PUA AA (PUA)
IkarusPUA.Neoreklami
AviraHEUR/AGEN.1140578
Antiy-AVLTrojan/Generic.ASMalwS.35111BA
GDataGen:Variant.Jaik.48175
VBA32Adware.Agent
MAXmalware (ai score=82)
TrendMicro-HouseCallTROJ_GEN.R002H07AP22
RisingMalware.Heuristic!ET#89% (RDMK:cmRtazpYBggyOROV+dAO8YPet2DW)
YandexPUA.Neoreklami!7WnmMAJ41w4
FortinetAdware/Neoreklami
PandaTrj/CI.A

How to remove Trojan-Dropper.Win32.Agent.tetypq?

Trojan-Dropper.Win32.Agent.tetypq removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment