Trojan

Should I remove “Trojan.Emotet.YP (B)”?

Malware Removal

The Trojan.Emotet.YP (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Emotet.YP (B) virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Reads data out of its own binary image
  • The binary likely contains encrypted or compressed data.
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Installs itself for autorun at Windows startup
  • Collects information about installed applications
  • Creates a hidden or system file
  • Network activity detected but not expressed in API logs
  • Creates a copy of itself
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine Trojan.Emotet.YP (B)?


File Info:

crc32: 749E49A0
md5: 7a92e562f6f162f2c267c9a1110aa312
name: 7A92E562F6F162F2C267C9A1110AA312.mlw
sha1: 393eadc8f8d14493b41ab8dd29dd319f6c0531d1
sha256: 402b57650577428a20d2293174ba6b99b1d79c65ca8269a6e02ef4d0a0b5b49b
sha512: f93fe16dfef8f6faafad4e131a036ae0ab8c559359fa0489c2d5c92251e20b1b3be80aaa8525d7833553dfcfce461b85d9ae490045cd0ff896749a888ae874d0
ssdeep: 24576:F4nNKtIhYR/76mf0HU8JLni1LjNvocD/0jnhqLBs+Gxec:F4NK2Y/92Lni11voc7MIixB
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

InternalName: ?.x01LegalCopyright
FileVersion: 6.1.7600.16385 (win7_rtm.090713-1255)
torAuthn.exe: j%x01ProductName
icrosoft Corporation. All rights reserved.: Hx10x01OriginalFilename
CompanyName: Microsoft Corporation
FileDescription: Windows Enhanced Storage Password Authentication Program
.7600.16385: D
rosoftxae Windowsxae Operating System: Bx0fx01ProductVersion
Translation: 0x0409 0x04b0

Trojan.Emotet.YP (B) also known as:

BkavW32.AIDetect.malware2
K7AntiVirusTrojan ( 005356831 )
Elasticmalicious (high confidence)
DrWebTrojan.Encoder.858
CynetMalicious (score: 100)
ALYacTrojan.Emotet.YP
CylanceUnsafe
ZillyaTrojan.Generic.Win32.780188
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (D)
K7GWTrojan ( 005356831 )
Cybereasonmalicious.2f6f16
CyrenW32/Agent.BAD.gen!Eldorado
SymantecPacked.Generic.459
ESET-NOD32a variant of Win32/Kryptik.GLWT
APEXMalicious
AvastWin32:Malware-gen
ClamAVWin.Ransomware.Shade-7598580-0
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderTrojan.Emotet.YP
MicroWorld-eScanTrojan.Emotet.YP
TencentMalware.Win32.Gencirc.10cd7db1
Ad-AwareTrojan.Emotet.YP
SophosML/PE-A + Mal/Cerber-AM
BitDefenderThetaGen:NN.ZexaF.34266.9q1@ayhpw!ci
VIPRETrojan.Win32.Generic!BT
TrendMicroRansom.Win32.SHADE.SMB.hp
McAfee-GW-EditionBehavesLike.Win32.Dropper.dc
FireEyeGeneric.mg.7a92e562f6f162f2
EmsisoftTrojan.Emotet.YP (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Fsysna.jib
AviraTR/AD.Troldesh.fxmlg
eGambitUnsafe.AI_Score_98%
Antiy-AVLTrojan/Generic.ASMalwS.2B430E9
MicrosoftRansom:Win32/Shade.C
GDataTrojan.Emotet.YP
TACHYONTrojan/W32.Agent.1005089
AhnLab-V3Trojan/Win32.Agent.R266421
Acronissuspicious
McAfeeTrickbot-FRDP!7A92E562F6F1
MAXmalware (ai score=85)
VBA32BScope.Trojan.Fsysna
MalwarebytesMalware.AI.3504648514
PandaTrj/Genetic.gen
TrendMicro-HouseCallRansom.Win32.SHADE.SMB.hp
YandexTrojan.GenAsa!GwqqbRs3vQ0
IkarusTrojan-Ransom.Crypted007
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.GKHG!tr
AVGWin32:Malware-gen

How to remove Trojan.Emotet.YP (B)?

Trojan.Emotet.YP (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment