Trojan

What is “Trojan.Py.Keylogger.A”?

Malware Removal

The Trojan.Py.Keylogger.A is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware - Review 2020

GridinSoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend to use GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the TRIAL period.
6-day free trial available.

What Trojan.Py.Keylogger.A virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • A process attempted to delay the analysis task.
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Sniffs keystrokes
  • Created a process from a suspicious location
  • Installs itself for autorun at Windows startup
  • CAPE detected the PyInstaller malware family
  • Creates a copy of itself

How to determine Trojan.Py.Keylogger.A?


File Info:

name: F4272AD5C04091701E69.mlw
path: /opt/CAPEv2/storage/binaries/f0ca2d8c9c4ef455b1baf1634a2f6e3b911e66db6d48d62ebbd74a2bc2e9ddbe
crc32: 4C576C40
md5: f4272ad5c04091701e69e631c87cc222
sha1: 3ac5c67a13f1a66285c434f647129acc8ca5dd91
sha256: f0ca2d8c9c4ef455b1baf1634a2f6e3b911e66db6d48d62ebbd74a2bc2e9ddbe
sha512: 6395a4dab6d82b2e571ba442af0fed0ae8ba14f13837f5171993501084741c88b51243771e22d41097a668d71bde29b1cc4e1842c7325b44f1bd2830b5fc8191
ssdeep: 98304:rndBAEoDCqpwbp2FzZT0jufu2dZ3HQYGNxf7JeiUqKQsFYIhsYYh4Jhf:/xCzCbpSzZTfu2/Q7YqHsF9hsHh4z
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T173463302D1F1C9A2D1B53CB84AB2E3BAB73D99651B29C4DFCB483B5A9D0B383513D245
sha3_384: 3407440aee05a47ebddaa076aec4c8efb5e5049c00f273339c975f8d3f7d89904a43f3e632421ee95a3d9324a4ef41e5
ep_bytes: e838050000e98efeffffcccccc575653
timestamp: 2020-01-05 12:16:35

Version Info:

CompanyName: Adobe Systems Incorporated
FileDescription: Adobe Download Manager
FileVersion: 2.0.0.135s
InternalName: Adobe Download Manager
LegalCopyright: Copyright 2015 Adobe Systems Incorporated. All rights reserved.
OriginalFilename: Adobe Download Manager
ProductName: Adobe Download Manager
ProductVersion: 2.0.0.135s
Translation: 0x0409 0x04b0

Trojan.Py.Keylogger.A also known as:

BkavW32.AIDetect.malware2
DrWebPython.Keylog.58
ClamAVWin.Dropper.Python-9811479-0
FireEyeGeneric.mg.f4272ad5c0409170
McAfeePython/PWS.d
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 0052d4d01 )
BitDefenderTrojan.Py.Keylogger.A
K7GWTrojan ( 0052d4d01 )
Cybereasonmalicious.5c0409
Elasticmalicious (high confidence)
ESET-NOD32Python/Spy.KeyLogger.V
CynetMalicious (score: 99)
KasperskyHEUR:Trojan.Win32.Agent.vho
NANO-AntivirusTrojan.PYC.KeyLog.epwywq
MicroWorld-eScanTrojan.Py.Keylogger.A
RisingTrojan.Generic@AI.98 (RDMK:M+XjLlxgcMgD1PoIAT+x2w)
Ad-AwareTrojan.Py.Keylogger.A
EmsisoftTrojan.Py.Keylogger.A (B)
McAfee-GW-EditionBehavesLike.Win32.Dropper.tc
SophosGeneric ML PUA (PUA)
IkarusTrojan-Spy.Keylogger.Agent
AviraTR/Spy.Gen
MAXmalware (ai score=88)
MicrosoftTrojan:Win32/Wacatac.B!ml
GDataTrojan.Py.Keylogger.A
AhnLab-V3Malware/Win32.RL_Generic.R326852
ALYacTrojan.Py.Keylogger.A
PandaTrj/Genetic.gen
APEXMalicious
SentinelOneStatic AI – Suspicious PE
FortinetW32/KeyLogger.BS!tr.spy
CrowdStrikewin/malicious_confidence_60% (D)

How to remove Trojan.Py.Keylogger.A?

Trojan.Py.Keylogger.A removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment