Trojan

Should I remove “Trojan.Sigmal.S2438680”?

Malware Removal

The Trojan.Sigmal.S2438680 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Sigmal.S2438680 virus can do?

  • Authenticode signature is invalid
  • Anomalous binary characteristics

How to determine Trojan.Sigmal.S2438680?


File Info:

name: 7493FBA7DD75740717DD.mlw
path: /opt/CAPEv2/storage/binaries/85fbad138d964ef88ed9083c7dbd154030768d633196dc9cfd0c86c40d16fc2e
crc32: 232762D5
md5: 7493fba7dd75740717dd0e8b293b45a9
sha1: ad9370f02ff9a655178fff2117300b39d81ce90e
sha256: 85fbad138d964ef88ed9083c7dbd154030768d633196dc9cfd0c86c40d16fc2e
sha512: 5487517f4a301dff8fa9fc43402d8280307cd40faed5ed2bb4d6d85426f8b92b21ce4cb5a63c0bbe9b42b1e5da7ab62285c2edaddd596269532e1af69327b871
ssdeep: 6144:yTS1e7bB16z6Izu24Yd+0yO/IPXhU8f8yKT2p:CUeHIiS/yO/ARXKY
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T18E44121679B1843BC88145B0CE7EC2871F665A1667489ECFFB8966AE4B173C0ED3710E
sha3_384: ae8c959c4a26cc8c82ebd3dbbc29521dbd6e19616a84cf2773fc2dfbab34a8a3128f376fd13003b3522ee25b19df6f64
ep_bytes: e8071a0000e978feffff558bec83ec08
timestamp: 2018-11-17 01:50:46

Version Info:

0: [No Data]

Trojan.Sigmal.S2438680 also known as:

BkavW32.FamVT.USBaVDb.Worm
LionicTrojan.Win32.Pioneer.ts99
Elasticmalicious (high confidence)
DrWebTrojan.Siggen7.49534
MicroWorld-eScanTrojan.GenericKD.66470245
FireEyeGeneric.mg.7493fba7dd757407
CAT-QuickHealTrojan.Sigmal.S2438680
SkyhighBehavesLike.Win32.MultiPlug.dh
ALYacTrojan.GenericKD.66470245
MalwarebytesGeneric.Malware.AI.DDS
ZillyaTrojan.Kryptik.Win32.4098999
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 0052b1cd1 )
AlibabaTrojan:Win32/Khalesi.373
K7GWTrojan ( 0052b1cd1 )
Cybereasonmalicious.02ff9a
BitDefenderThetaGen:NN.ZexaF.36744.qqW@aiNQxQjO
SymantecML.Attribute.HighConfidence
tehtrisGeneric.Malware
ESET-NOD32a variant of Win32/Kryptik.GSKY
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Trojan.Agent-6947762-1
KasperskyHEUR:Trojan.Win32.Khalesi.gen
BitDefenderTrojan.GenericKD.66470245
NANO-AntivirusTrojan.Win32.Khalesi.fmzlvt
SUPERAntiSpywareTrojan.Agent/Gen-Zusy
AvastWin32:Bzofiku-A [Drp]
TencentTrojan.Win32.Khalesi.a
EmsisoftTrojan.Agent (A)
F-SecureTrojan.TR/AD.Qadars.avu
VIPRETrojan.GenericKD.66470245
TrendMicroTROJ_KHALESI.SMALY
SophosMal/Generic-S
SentinelOneStatic AI – Suspicious PE
GDataWin32.Trojan.Khalesi.B
JiangminTrojan.Lethic.aa
VaristW32/S-9d6faaad!Eldorado
AviraTR/AD.Qadars.avu
MAXmalware (ai score=88)
Antiy-AVLTrojan/Win32.Khalesi
Kingsoftmalware.kb.a.1000
XcitiumTrojWare.Win32.Khalesi.DS@7h11qn
ArcabitTrojan.Generic.D3F64165
ViRobotTrojan.Win32.Khalesi.267776
ZoneAlarmHEUR:Trojan.Win32.Khalesi.gen
MicrosoftVirTool:Win32/CeeInject.ANO!bit
GoogleDetected
AhnLab-V3Trojan/Win32.MDA.R221226
McAfeePacked-XB!7493FBA7DD75
VBA32BScope.Trojan.Packed
Cylanceunsafe
PandaTrj/CI.A
ZonerTrojan.Win32.75824
TrendMicro-HouseCallTROJ_KHALESI.SMALY
RisingTrojan.Injector!1.BABB (CLASSIC)
YandexTrojan.Khalesi!9g10B1J6gOY
IkarusTrojan.Win32.Khalesi
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/GenKryptik.ARNZ!tr
AVGWin32:Bzofiku-A [Drp]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan.Sigmal.S2438680?

Trojan.Sigmal.S2438680 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment