Trojan

Trojan.Generic.31219362 removal

Malware Removal

The Trojan.Generic.31219362 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Generic.31219362 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Dynamic (imported) function loading detected
  • Enumerates running processes
  • Expresses interest in specific running processes
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Likely virus infection of existing system binary

How to determine Trojan.Generic.31219362?


File Info:

name: B4E85696A0B2CE952C68.mlw
path: /opt/CAPEv2/storage/binaries/dbb960ee460fc1523d0c2f7e00c5eba9c7f1839f28eb1a25649537ce48404751
crc32: DC09FED9
md5: b4e85696a0b2ce952c687024e3f59906
sha1: 3ea1871a1649c65905800d152e552be5be318621
sha256: dbb960ee460fc1523d0c2f7e00c5eba9c7f1839f28eb1a25649537ce48404751
sha512: 0125068593e58f9fb99ca866400dc0fefc7822a5627b8caf51567e9254538ec18ab1a99f5b2bedc335a9f007d38dea566a11f0bc599cec83c52955e45ab5423b
ssdeep: 49152:TcsQ6QJrEH3eJQmRgOvsG8pnI8F2ePQZC4k0Y4QGIPLONkPGB:T1QTOXeJQ2vop2nCZD9z4UO
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1EED5F127B298753EC4AE27354673A05068FBB66DF417BE1627E4C48CCF720C11E3AA65
sha3_384: 85b9bac1e05c76ae9a7294b1ff7a877766bb824ec588f3761730358f11cbf0f83a1fd0ede244ea82c63a87cb7c8b1364
ep_bytes: 558bec83c4a453565733c08945c48945
timestamp: 2021-07-22 05:43:38

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName: Cat Logic
FileDescription: CatList Setup
FileVersion:
LegalCopyright:
OriginalFileName:
ProductName: CatList
ProductVersion: 0.8.0.5
Translation: 0x0000 0x04b0

Trojan.Generic.31219362 also known as:

BkavW32.AIDetect.malware1
MicroWorld-eScanTrojan.Generic.31219362
FireEyeTrojan.Generic.31219362
CAT-QuickHealTrojan.Staser
McAfeeArtemis!B4E85696A0B2
K7AntiVirusTrojan ( 0057e05e1 )
AlibabaTrojanDropper:Win32/Staser.53fc1727
K7GWTrojan ( 0057e05e1 )
CyrenW32/Addrop.K.gen!Eldorado
SymantecTrojan.Gen.MBT
ESET-NOD32Win32/TrojanDropper.Addrop.DH
APEXMalicious
KasperskyTrojan.Win32.Staser.elaz
BitDefenderTrojan.Generic.31219362
AvastWin32:Trojan-gen
Ad-AwareTrojan.Generic.31219362
EmsisoftTrojan.Generic.31219362 (B)
TrendMicroTROJ_GEN.R011C0WKP21
McAfee-GW-EditionBehavesLike.Win32.Dropper.vc
SophosMal/Generic-S
GDataTrojan.Generic.31219362
AviraHEUR/AGEN.1143627
GridinsoftRansom.Win32.Wacatac.sa
MicrosoftTrojan:Win32/Wacatac.B!ml
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win.Trojan-gen.C4784191
ALYacTrojan.Generic.31219362
MAXmalware (ai score=81)
MalwarebytesAdware.DownloadAssistant
TrendMicro-HouseCallTROJ_GEN.R011C0WKP21
IkarusTrojan-Dropper.Win32.Addrop
FortinetW32/Addrop.DH!tr
AVGWin32:Trojan-gen

How to remove Trojan.Generic.31219362?

Trojan.Generic.31219362 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment