Ransom Trojan

Trojan.Ransom.AJM removal guide

Malware Removal

The Trojan.Ransom.AJM is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Ransom.AJM virus can do?

  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Reads data out of its own binary image
  • A process created a hidden window
  • Drops a binary and executes it
  • Uses Windows utilities for basic functionality
  • Executed a process and injected code into it, probably while unpacking
  • Attempts to remove evidence of file being downloaded from the Internet
  • Deletes its original binary from disk
  • Installs itself for autorun at Windows startup
  • Writes a potential ransom message to disk
  • Network activity detected but not expressed in API logs
  • Creates a copy of itself
  • Creates a known TeslaCrypt/AlphaCrypt ransomware decryption instruction / key file.
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

How to determine Trojan.Ransom.AJM?


File Info:

crc32: 55117C23
md5: 7afceffac38ffae93d84449ec606516b
name: 7AFCEFFAC38FFAE93D84449EC606516B.mlw
sha1: 5ce622aba64e21f50b8be43f1ae992e544840bee
sha256: fcc04837074af939800fa93d8b6f4aaecde00bcf49c298785657aa3e874b144e
sha512: eb39c6f2dcaeaa0ec1652cbf6874f74d46476d24056bc11e4c2a8bbf718de1b4a4407780e9007d2968b19366b263f09a05f33b5f26fbff788df27788537d3f3e
ssdeep: 6144:jWjdUYaI5plDzQHjOP1T11T6tW15pLMSmC1SeO4ptL:ijaYaIDzQDOB11Ot04vCkeOy
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Trojan.Ransom.AJM also known as:

BkavW32.AIDetect.malware1
K7AntiVirusTrojan ( 00537fae1 )
Elasticmalicious (high confidence)
DrWebTrojan.Encoder.1075
CynetMalicious (score: 100)
ALYacTrojan.Ransom.FileCryptor
CylanceUnsafe
ZillyaTrojan.Bitman.Win32.249
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_70% (D)
K7GWTrojan ( 00537fae1 )
Cybereasonmalicious.ac38ff
CyrenW32/Ransom.UOWF-6863
ESET-NOD32a variant of Win32/Injector.CANT
APEXMalicious
AvastWin32:CryptoWall-U [Trj]
ClamAVWin.Trojan.Ransom-9079
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderTrojan.Ransom.AJM
NANO-AntivirusTrojan.Win32.Bitman.drqwqd
SUPERAntiSpywareTrojan.Agent/Gen-Crypto
MicroWorld-eScanTrojan.Ransom.AJM
Ad-AwareTrojan.Ransom.AJM
SophosML/PE-A
BitDefenderThetaGen:NN.ZexaF.34738.FqX@auQGG3ki
VIPRETrojan.Win32.Generic!BT
TrendMicroTROJ_CRYPTESLA.SM3
McAfee-GW-EditionBehavesLike.Win32.Generic.hm
FireEyeGeneric.mg.7afceffac38ffae9
EmsisoftTrojan.Ransom.AJM (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan/Bitman.dg
WebrootTrojan.Dropper.Gen
AviraHEUR/AGEN.1126304
eGambitUnsafe.AI_Score_98%
Antiy-AVLTrojan/Generic.ASMalwS.10DD09D
MicrosoftRansom:Win32/Tescrypt.A
ArcabitTrojan.Ransom.AJM
GDataTrojan.Ransom.AJM
AhnLab-V3Trojan/Win32.Ransom.R149014
McAfeeRansom-Tescrypt!7AFCEFFAC38F
MAXmalware (ai score=84)
VBA32Hoax.Bitman
MalwarebytesTrojan.MalPack.GS
TrendMicro-HouseCallTROJ_CRYPTESLA.SM3
RisingTrojan.Generic@ML.100 (RDML:fSRcSr7IQEx8WCTHSj8Nuw)
YandexTrojan.Bitman!B/5KaKmUa4A
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Injector.CANT!tr
AVGWin32:CryptoWall-U [Trj]
Paloaltogeneric.ml

How to remove Trojan.Ransom.AJM?

Trojan.Ransom.AJM removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment