Trojan

How to remove “Trojan.LuckyMouse”?

Malware Removal

The Trojan.LuckyMouse is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.LuckyMouse virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Presents an Authenticode digital signature
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • Authenticode signature is invalid
  • Behavioural detection: Injection (Process Hollowing)
  • Behavioural detection: Injection (inter-process)
  • CAPE detected the HyperBro02 malware family
  • Deletes executed files from disk
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan.LuckyMouse?


File Info:

name: FB7F32EA4116175CBDF1.mlw
path: /opt/CAPEv2/storage/binaries/02328d9b33e77727ef79f9f30f6c35eb003de8be95e3f36337c6be5d8547906b
crc32: 8AF5B06B
md5: fb7f32ea4116175cbdf167b7396e7a6e
sha1: b8b3dd1cd4c7e1f8765eb3ea7c4dcf50cf862389
sha256: 02328d9b33e77727ef79f9f30f6c35eb003de8be95e3f36337c6be5d8547906b
sha512: d4343e82857134608f5855050796bc3f7b7c8f6d1f7c578c4d101fcc079601210a0ffaa51b33b86a962c7767efca7c951ba0effc15f98a97223ed0e80298ba9e
ssdeep: 6144:RHsXNa2KXwPIkk9r8lJQYdh1ekpFlM1ycw/M4Px1pUJYTfg:9iaLXUTfvp6l5451pO
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1F56412925B8400A5CD6FCB737295A2619CF5F7A625C8A8CB4B346C67FB98F031B5402F
sha3_384: d63627136cd5fd593cd90d82b0ef6329b486e117f3b145637b668fa42b03321b114c0c96558212f881d851428b06c201
ep_bytes: 558bec6aff68e870400068c065400064
timestamp: 2010-11-18 18:41:55

Version Info:

CompanyName: Igor Pavlov
FileDescription:
FileVersion: 9.20
InternalName: 7zS2.sfx
LegalCopyright: Copyright (c) 1999-2010 Igor Pavlov
OriginalFilename: 7zS2.sfx.exe
ProductName: 7-Zip
ProductVersion: 9.20
Translation: 0x0409 0x04b0

Trojan.LuckyMouse also known as:

Elasticmalicious (moderate confidence)
MicroWorld-eScanGen:Variant.Bulz.830904
FireEyeGen:Variant.Bulz.830904
McAfeeArtemis!FB7F32EA4116
VIPREGen:Variant.Bulz.830904
K7AntiVirusTrojan ( 00589cdb1 )
K7GWTrojan ( 00589cdb1 )
CyrenW32/ABRisk.OINE-2535
SymantecTrojan.Gen.MBT
ESET-NOD32a variant of Win32/GenCBL.BCZ
CynetMalicious (score: 99)
KasperskyUDS:Trojan.Win32.Agent.gen
BitDefenderGen:Variant.Bulz.830904
NANO-AntivirusTrojan.Win32.LuckyMouse.jmqjog
AvastWin32:DangerousSig [Trj]
SophosMal/Generic-R
F-SecureTrojan.TR/Redcap.ughui
DrWebTrojan.Siggen15.37059
ZillyaDownloader.Upatre.Win32.66072
TrendMicroBackdoor.Win32.HYPERBRO.ENH.enc
McAfee-GW-EditionArtemis
EmsisoftGen:Variant.Bulz.830904 (B)
GDataWin32.Trojan.Korplug.B
JiangminTrojan.Agent.dyfv
AviraTR/Redcap.jzqgw
Antiy-AVLTrojan/Win32.LuckyMouse
ArcabitTrojan.Bulz.DCADB8
ZoneAlarmUDS:Trojan.Win32.Agent.gen
MicrosoftTrojan:Win32/Wacatac.B!ml
GoogleDetected
ALYacGen:Variant.Bulz.830904
MAXmalware (ai score=87)
VBA32Trojan.Agent
MalwarebytesTrojan.LuckyMouse
PandaTrj/CI.A
TrendMicro-HouseCallBackdoor.Win32.HYPERBRO.ENH.enc
RisingTrojan.LuckyMouse!8.63C8 (TFE:6:hkoB8nQtN)
IkarusTrojan.Win32.LuckyMouse
FortinetW32/LuckyMouse.BU!tr
AVGWin32:DangerousSig [Trj]
DeepInstinctMALICIOUS

How to remove Trojan.LuckyMouse?

Trojan.LuckyMouse removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment