Ransom Trojan

Trojan-Ransom.Win32.SuspFile removal guide

Malware Removal

The Trojan-Ransom.Win32.SuspFile is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Ransom.Win32.SuspFile virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Anomalous binary characteristics

How to determine Trojan-Ransom.Win32.SuspFile?


File Info:

name: F3CB3A33EBB05F2054F8.mlw
path: /opt/CAPEv2/storage/binaries/00bcad2f6f667f7203b418b95acc7e9daf2af649df0bed548f1148043c021d38
crc32: 3DE969E2
md5: f3cb3a33ebb05f2054f80a1961d56e82
sha1: a88ce3a9201d340f97c66d5e32a3cc112023a9de
sha256: 00bcad2f6f667f7203b418b95acc7e9daf2af649df0bed548f1148043c021d38
sha512: b68f4147188cf0abe971e560bb2b4b211ef19510d7c4eed706b605392961bbd1a83433f25f4518a61124a2c9ca86ef13efe096ccf4492447fb6262203236c59e
ssdeep: 12288:i5D7NMuaz/RwSWUF49tOj9JcF4gkxyWpAJX0x5Yxn1n/WtZmi:i1Cr6FQ49tOTAarkXiuna4i
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T119654832ADACC83EC466D6388D6A526744FB7D30293BDD4D26F44F0C0A7726CEB64196
sha3_384: 9aa43e947370486dae618c605584fe68002dfc9c3e9c0087d7b96487f473561303558a82849c1e4ba5adedcc47718f8b
ep_bytes: 558bec83c4f0b884234800e8e83cf8ff
timestamp: 1992-06-19 22:22:17

Version Info:

0: [No Data]

Trojan-Ransom.Win32.SuspFile also known as:

LionicTrojan.Win32.SuspFile.j!c
CynetMalicious (score: 99)
ALYacTrojan.GenericKD.38238528
K7AntiVirusTrojan ( 0058ba2e1 )
AlibabaRansom:Win32/SuspFile.b11e1eb0
K7GWTrojan ( 0058ba2e1 )
CrowdStrikewin/malicious_confidence_80% (W)
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Injector.EQSS
APEXMalicious
Paloaltogeneric.ml
KasperskyHEUR:Trojan-Ransom.Win32.SuspFile.gen
BitDefenderTrojan.GenericKD.38238528
MicroWorld-eScanTrojan.GenericKD.38238528
AvastWin32:Malware-gen
RisingTrojan.Generic@ML.100 (RDML:oQYrsNp/BD8lpPq0NsEOkw)
Ad-AwareTrojan.GenericKD.38238528
SophosMal/Generic-S
F-SecureTrojan.TR/AD.Swrort.aiqcb
TrendMicroTrojan.Win32.SHELLOAD.BD
McAfee-GW-EditionBehavesLike.Win32.Dropper.tm
FireEyeTrojan.GenericKD.38238528
EmsisoftTrojan.GenericKD.38238528 (B)
GDataWin32.Trojan.Kryptik.NWKXHZ
WebrootW32.Trojan.Gen
AviraTR/AD.Swrort.aiqcb
MAXmalware (ai score=81)
Antiy-AVLTrojan/Generic.ASMalwS.1FF2158
GridinsoftRansom.Win32.Sabsik.sa
ArcabitTrojan.Generic.D2477940
MicrosoftTrojan:Win32/Fareit!ml
AhnLab-V3Trojan/Win.Generic.C4834421
McAfeeGenericRXAA-AA!F3CB3A33EBB0
VBA32BScope.Exploit.Shellcode
MalwarebytesTrojan.MalPack
TrendMicro-HouseCallTrojan.Win32.SHELLOAD.BD
IkarusTrojan.Win32.Injector
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/GenKryptik.FMWI!tr
BitDefenderThetaGen:NN.ZelphiF.34084.DHW@aGwi8Chi
AVGWin32:Malware-gen
PandaTrj/GdSda.A

How to remove Trojan-Ransom.Win32.SuspFile?

Trojan-Ransom.Win32.SuspFile removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment