Trojan

Trojan.Heur.AutoIT.4 removal guide

Malware Removal

The Trojan.Heur.AutoIT.4 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Heur.AutoIT.4 virus can do?

  • Sample contains Overlay data
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • Creates an autorun.inf file
  • Authenticode signature is invalid
  • A ping command was executed with the -n argument possibly to delay analysis
  • Uses Windows utilities for basic functionality
  • Creates a copy of itself
  • Deletes executed files from disk
  • Attempts to modify Explorer settings to prevent hidden files from being displayed

How to determine Trojan.Heur.AutoIT.4?


File Info:

name: 496187CC363312A93FC0.mlw
path: /opt/CAPEv2/storage/binaries/6ed86066f1084714aae6528abf7c3b4ba8843b9640881dde8422bb8d01584974
crc32: 21083641
md5: 496187cc363312a93fc0fa7e9469abdc
sha1: 0a2009563051886b1a50d7b8529eb19a1961ae78
sha256: 6ed86066f1084714aae6528abf7c3b4ba8843b9640881dde8422bb8d01584974
sha512: a58572672d35eee6c7b7d9ee07b482a2e084cf831f63937c8d568e0954bee173e39aa69cfd16528e05234c29dc88ea6d5e754cc8cf9d0de5d15bfeb6820386e0
ssdeep: 12288:C6SKqT31T6WpJY6V765jKqostkm3ObUldjqppEp:PxqT31T6WE6I5jKqosOm+bUldu6p
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1CAE4AE6736F16231C5B361F49A6BD339A33ABD305632960B63D87D1B3370551AA3A323
sha3_384: 3e7b053300c583363483394bf54d46c90cf5b12c36f1ee376a18bb8a09decfc577e44700ad8f83f3ef0c616c62746473
ep_bytes: e848b10000e917feffffb8ab094600a3
timestamp: 2008-06-12 08:51:05

Version Info:

FileVersion: 23.54.74.98
Comments: FtG
FileDescription: Tear
LegalCopyright: GVd
Translation: 0x0807 0x04b0

Trojan.Heur.AutoIT.4 also known as:

BkavW32.Common.AD2373B8
LionicTrojan.Win32.Autoit.4!c
tehtrisGeneric.Malware
MicroWorld-eScanGen:Trojan.Heur.AutoIT.4
FireEyeGeneric.mg.496187cc363312a9
ALYacGen:Trojan.Heur.AutoIT.4
VIPREGen:Trojan.Heur.AutoIT.4
SangforWorm.Win32.Autoit.Vxeh
AlibabaWorm:Win32/Tifaut.3b4cfb83
Cybereasonmalicious.c36331
VirITTrojan.Win32.Agent.CWC
CyrenW32/AutoIt.I.gen!Eldorado
SymantecW32.Harakit
Elasticmalicious (high confidence)
ESET-NOD32Win32/Tifaut.C.Gen
APEXMalicious
CynetMalicious (score: 100)
KasperskyWorm.Win32.AutoIt.ud
BitDefenderGen:Trojan.Heur.AutoIT.4
NANO-AntivirusTrojan.Win32.AutoIt.bwfoxv
AvastAutoIt:Agent-JL [Trj]
TencentWin32.Worm.Autoit.Pdmf
Ad-AwareGen:Trojan.Heur.AutoIT.4
EmsisoftGen:Trojan.Heur.AutoIT.4 (B)
ComodoMalware@#3rsjxxwojvuqa
F-SecureTrojan.TR/Agent.695687
DrWebWin32.HLLW.Autohit.10914
ZillyaTrojan.AutoIT.Win32.1050
TrendMicroTROJ_GEN.F47EZHD
McAfee-GW-EditionBehavesLike.Win32.Dropper.jh
Trapminemalicious.moderate.ml.score
SophosMal/Renocide-C
GDataGen:Trojan.Heur.AutoIT.4
WebrootW32.Autorun.Gen
AviraTR/Agent.695687
MAXmalware (ai score=95)
KingsoftWin32.Troj.Generic_a.c.(kcloud)
ZoneAlarmUDS:DangerousObject.Multi.Generic
MicrosoftTrojan:Win32/Wacatac.B!ml
GoogleDetected
McAfeeArtemis!496187CC3633
VBA32Trojan-Downloader.Autoit.gen
TrendMicro-HouseCallTROJ_GEN.F47EZHD
YandexTrojan.Autoit.Gen!Pac
IkarusWorm.Win32.Tifaut
FortinetW32/AutoIt.RZ!worm
BitDefenderThetaAI:Packer.ADE5CE5E18
AVGAutoIt:Agent-JL [Trj]
PandaTrj/Autoit.gen
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan.Heur.AutoIT.4?

Trojan.Heur.AutoIT.4 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment