Spy Trojan

Trojan-Spy.Win32.Stealer.aaal (file analysis)

Malware Removal

The Trojan-Spy.Win32.Stealer.aaal is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Spy.Win32.Stealer.aaal virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Expresses interest in specific running processes
  • The binary likely contains encrypted or compressed data.
  • Checks for the presence of known windows from debuggers and forensic tools
  • Tries to unhook or modify Windows functions monitored by Cuckoo
  • The following process appear to have been packed with Themida: B5F081A787B1DB03D3D319D4327578BD.mlw
  • Network activity detected but not expressed in API logs
  • Checks the version of Bios, possibly for anti-virtualization
  • Detects VirtualBox through the presence of a registry key
  • Anomalous binary characteristics

How to determine Trojan-Spy.Win32.Stealer.aaal?


File Info:

crc32: B01C7E84
md5: b5f081a787b1db03d3d319d4327578bd
name: B5F081A787B1DB03D3D319D4327578BD.mlw
sha1: 755a53a35415daf81a2dcc0645b535006a735d46
sha256: 48b2a07cdeb78aab82fcfdde2ffef02edf69d9c0a85460994e8e21c7890d2631
sha512: 73ec62205d8838dfb8eab8f31328c7e9a8773493cfcf8e5bb866605f6900150722c98247095e655c292a7dbe268354a36414ec35bade37898e99114ae02fe738
ssdeep: 49152:pw40z/DDWlgL7t0NF+jV0aAMdmdvjg1QN9O/9KC/uNjnD:p7f61vdsgONwgC/WjnD
type: PE32 executable (console) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright xa9 2021 Binance, Inc.
InternalName: Binance
FileVersion: 1.21.2
CompanyName: BinanceTech
SquirrelAwareVersion: 1
ProductName: Binance
ProductVersion: 1.21.2.0
FileDescription: Binance
OriginalFilename:
Translation: 0x0409 0x04b0

Trojan-Spy.Win32.Stealer.aaal also known as:

BkavW32.AIDetect.malware2
LionicTrojan.Win32.Agent.m!c
Elasticmalicious (high confidence)
DrWebTrojan.PWS.Siggen3.2426
ALYacGen:Variant.Razy.600165
CylanceUnsafe
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_90% (W)
AlibabaPacked:Win32/Themida.46772e7f
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Packed.Themida.HKZ
APEXMalicious
AvastFileRepMalware
CynetMalicious (score: 100)
KasperskyTrojan-Spy.Win32.Stealer.aaal
BitDefenderGen:Variant.Razy.600165
NANO-AntivirusVirus.Win32.Gen-Crypt.ccnc
MicroWorld-eScanGen:Variant.Razy.600165
TencentWin32.Trojan.Razy.Phzs
Ad-AwareGen:Variant.Razy.600165
SophosMal/Generic-S
BitDefenderThetaGen:NN.ZexaF.34104.fI0@aKF1Xrdi
McAfee-GW-EditionBehavesLike.Win32.Generic.vc
FireEyeGeneric.mg.b5f081a787b1db03
EmsisoftGen:Variant.Razy.600165 (B)
SentinelOneStatic AI – Malicious PE
WebrootW32.Trojan.TR.Crypt.XPACK
AviraTR/Crypt.XPACK.Gen
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
GridinsoftTrojan.Heur!.032100A1
ArcabitTrojan.Razy.D92865
ZoneAlarmTrojan-Spy.Win32.Stealer.aaal
GDataGen:Variant.Razy.600165
Acronissuspicious
McAfeeArtemis!B5F081A787B1
MAXmalware (ai score=87)
VBA32BScope.TrojanPSW.Agent
MalwarebytesSpyware.RedLineStealer
TrendMicro-HouseCallTROJ_GEN.R002H07HO21
RisingTrojan.Generic@ML.100 (RDMK:5hpqsRDtkwkWWY8p3j1i+Q)
IkarusTrojan.Win32.Themida
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/PossibleThreat
AVGFileRepMalware
Paloaltogeneric.ml

How to remove Trojan-Spy.Win32.Stealer.aaal?

Trojan-Spy.Win32.Stealer.aaal removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment