Trojan

Should I remove “Trojan-PSW.Win32.Predator.gbl”?

Malware Removal

The Trojan-PSW.Win32.Predator.gbl is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-PSW.Win32.Predator.gbl virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Creates RWX memory
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Unconventionial language used in binary resources: Russian
  • Executed a process and injected code into it, probably while unpacking
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Steals private information from local Internet browsers
  • Collects information about installed applications
  • Attempts to modify proxy settings
  • Attempts to access Bitcoin/ALTCoin wallets
  • Harvests credentials from local FTP client softwares
  • Harvests information related to installed instant messenger clients
  • Harvests information related to installed mail clients

Related domains:

z.whorecord.xyz
054-235-2465.com
a.tomx.xyz
easy-web-weight-loss.com

How to determine Trojan-PSW.Win32.Predator.gbl?


File Info:

crc32: C67571EF
md5: 67ca255d1e293cce98cd371adf5ea97b
name: pr_priv.exe
sha1: 40f671ca18b66155e75f5902950b207e3eb6fcbd
sha256: 0fc4822aca8672be09c5e9f6103634447bb74f21432cd1e676797397d6c0c2cc
sha512: d8aba568c808be294f73dc466c9083d4a4f0470d2134aa51a7b68aca70b542b67913f7b89551b7ff416a54d7e59e8af2e7fab30f6e461af20b9fbe51b8bade0b
ssdeep: 12288:pZplibtiIw/k8gTHkpUT2GbG/2zRA8d4RSc+ALBl10NIe2n9Dx7ThvU9uBo:pIbtiI0k8MHUUyXX8d4RJ3l6NIH9tK95
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Trojan-PSW.Win32.Predator.gbl also known as:

McAfeeRDN/Generic.grp
CylanceUnsafe
SangforMalware
CrowdStrikewin/malicious_confidence_90% (W)
BitDefenderTrojan.GenericKD.32965765
K7GWRiskware ( 0040eff71 )
K7AntiVirusRiskware ( 0040eff71 )
TrendMicroTrojan.Win32.WACATAC.THABOBO
BitDefenderThetaGen:NN.ZexaF.34084.PyZ@a83b!aic
SymantecTrojan.Gen.MBT
ESET-NOD32a variant of Win32/GenKryptik.ECIJ
APEXMalicious
Paloaltogeneric.ml
KasperskyTrojan-PSW.Win32.Predator.gbl
AlibabaTrojanPSW:Win32/Predator.ecafa6af
AvastWin32:MalwareX-gen [Trj]
RisingTrojan.Inject!8.103 (RDMK:cmRtazpT8GMEQcoBa8uSd7Ys1hut)
Ad-AwareTrojan.GenericKD.32965765
EmsisoftTrojan.GenericKD.32965765 (B)
F-SecureTrojan.TR/AD.PredatorThief.zeryz
Invinceaheuristic
McAfee-GW-EditionBehavesLike.Win32.Generic.jc
FortinetW32/GenKryptik.ECIJ!tr
FireEyeGeneric.mg.67ca255d1e293cce
SophosMal/Generic-S
SentinelOneDFI – Suspicious PE
CyrenW32/Trojan.RRNV-4662
AviraTR/AD.PredatorThief.zeryz
Endgamemalicious (high confidence)
ArcabitTrojan.Generic.D1F70485
ZoneAlarmTrojan-PSW.Win32.Predator.gbl
MicrosoftTrojan:Win32/Tiggre!rfn
VBA32Trojan.Inject
ALYacTrojan.Agent.Wacatac
TrendMicro-HouseCallTrojan.Win32.WACATAC.THABOBO
TencentWin32.Trojan-qqpass.Qqrob.Wqxe
IkarusTrojan.Win32.Krypt
eGambitUnsafe.AI_Score_98%
GDataTrojan.GenericKD.32965765
AVGWin32:MalwareX-gen [Trj]
PandaTrj/GdSda.A
Qihoo-360Generic/HEUR/QVM08.0.AEB9.Malware.Gen

How to remove Trojan-PSW.Win32.Predator.gbl?

Trojan-PSW.Win32.Predator.gbl removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment