Trojan

What is “Trojan.Generic.30324025”?

Malware Removal

The Trojan.Generic.30324025 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Generic.30324025 virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Executed a command line with /C or /R argument to terminate command shell on completion which can be used to hide execution
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • A process created a hidden window
  • Drops a binary and executes it
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Uses Windows utilities for basic functionality
  • Created a process from a suspicious location

How to determine Trojan.Generic.30324025?


File Info:

name: 33CE45C7BC01222D0622.mlw
path: /opt/CAPEv2/storage/binaries/a3158fdf33a63df55a74ab2f1e832dce76e49c1a4b9536033629104ebb112614
crc32: DA8CE6E9
md5: 33ce45c7bc01222d0622dc306caded0b
sha1: a0ecab32f4433b24c6933d9796abd17366a1bbee
sha256: a3158fdf33a63df55a74ab2f1e832dce76e49c1a4b9536033629104ebb112614
sha512: 321da7facfecb606fb604b1975fbff84ce40dca89f268585f3214354142dc01877c0c04cc93d23d934c3eb831b43bc6c0cf5353207f3ea47f781559201169618
ssdeep: 12288:SoVl2TmnvZAdJ41JHQ1X+tiHbUGTUxp3jOxg7oat:rVgmnudJ41JWwiUrzOq8at
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T154B4E102BDC195B2C6210D325569BB61697DBD200F14CFEBB3E46A1E9A301D0FB35BA7
sha3_384: 142dd680d13046d271228d88a4ac5ae8948bb12709edd1cc87d82cb11521e186245b2b83d2c0c3f65d6515da5ecde956
ep_bytes: e864040000e988feffff3b0d68e64300
timestamp: 2021-05-17 07:28:58

Version Info:

0: [No Data]

Trojan.Generic.30324025 also known as:

LionicTrojan.Win32.Malicious.4!c
Elasticmalicious (high confidence)
DrWebBackDoor.Xtreme.38
CynetMalicious (score: 100)
FireEyeGeneric.mg.33ce45c7bc01222d
ALYacTrojan.Generic.30324025
MalwarebytesMalware.AI.2113132414
SangforSuspicious.Win32.Malware.gen
K7AntiVirusRiskware ( 0040eff71 )
AlibabaBackdoor:Win32/GRAFTOR.3e49255c
K7GWRiskware ( 0040eff71 )
VirITBackdoor.Win32.Xtreme.BM
CyrenW32/Agent.BJD.gen!Eldorado
SymantecTrojan.Gen.MBT
APEXMalicious
Paloaltogeneric.ml
ClamAVWin.Trojan.Generic-9910699-0
BitDefenderTrojan.Generic.30324025
MicroWorld-eScanTrojan.Generic.30324025
AvastWin32:Malware-gen
SophosMal/Generic-S (PUA)
ZillyaTrojan.Agensla.Win32.11816
TrendMicroTrojan.Win32.GRAFTOR.AM
McAfee-GW-EditionBehavesLike.Win32.Generic.hc
EmsisoftTrojan.Generic.30324025 (B)
IkarusBackdoor.Xtreme
AviraHEUR/AGEN.1115821
MicrosoftTrojan:Win32/Wacatac.B!ml
GDataTrojan.Generic.30324025
McAfeeArtemis!33CE45C7BC01
MAXmalware (ai score=84)
VBA32Backdoor.Xtreme
TrendMicro-HouseCallTrojan.Win32.GRAFTOR.AM
RisingMalware.DownloadSponsor!8.12DDC (CLOUD)
YandexBackDoor.Xtreme!85iBajSa6Qw
SentinelOneStatic AI – Malicious SFX
MaxSecureTrojan.Malware.300983.susgen
FortinetMalicious_Behavior.SB
AVGWin32:Malware-gen

How to remove Trojan.Generic.30324025?

Trojan.Generic.30324025 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment