Spy Trojan

What is “Trojan-Spy.Win32.Stealer.afhu”?

Malware Removal

The Trojan-Spy.Win32.Stealer.afhu is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Spy.Win32.Stealer.afhu virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Dynamic (imported) function loading detected
  • Possible date expiration check, exits too soon after checking local time
  • Enumerates the modules from a process (may be used to locate base addresses in process injection)
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • CAPE detected the RedLine malware family
  • Anomalous binary characteristics

How to determine Trojan-Spy.Win32.Stealer.afhu?


File Info:

name: 73555C7A696E172D0473.mlw
path: /opt/CAPEv2/storage/binaries/93460e1f492651f2a1e8260335f916b309d995d683a1761173f0636a411f15fd
crc32: 36362F39
md5: 73555c7a696e172d0473f267f69b709a
sha1: 11a64f64afb63048f14e4497e3a7105bcdef4494
sha256: 93460e1f492651f2a1e8260335f916b309d995d683a1761173f0636a411f15fd
sha512: 45ce1e4039da60e063d3e0fa9678ee763e28923eaba035ba4e3faf9b3cc2daf3571e2b8a44cb8d6c47d33d1f226635f6bad9664c81023afbe143902741e4b3d4
ssdeep: 6144:uDKW1Lgbdl0TBBvjc/gG1qSBQ/Jl96P1+euo6Z:oh1Lk70TnvjcN13BQ/JaP1+Vo6Z
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T14744CF1071C1C2B2C4B6153044E6CB7AAE393471577A92D7BBDD17BA6F212E1A3362CE
sha3_384: dadd10bced6272d3a248dcc18c73ad3d3dbddc251c72990b2ce30c28d666d6e3cf4a1346612164a4dc9c5500c6590696
ep_bytes: e8e15c0000e9a4feffff8bff558bec83
timestamp: 2012-07-13 22:47:16

Version Info:

Translation: 0x0000 0x04b0
FileDescription:
FileVersion: 0.0.0.0
InternalName: Morwongs.exe
LegalCopyright:
OriginalFilename: Morwongs.exe
ProductVersion: 0.0.0.0
Assembly Version: 0.0.0.0

Trojan-Spy.Win32.Stealer.afhu also known as:

LionicTrojan.Win32.Stealer.l!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Dopping.1
FireEyeGeneric.mg.73555c7a696e172d
ALYacGen:Variant.Dopping.1
CylanceUnsafe
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaTrojanSpy:MSIL/Stealer.36fdc978
K7GWSpyware ( 00588c5d1 )
K7AntiVirusSpyware ( 00588c5d1 )
BitDefenderThetaGen:NN.ZexaF.34212.pq0@aS0ViBm
CyrenW32/Trojan.DAN.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of MSIL/Spy.Agent.CVT
TrendMicro-HouseCallTROJ_GEN.R03BC0DJV21
KasperskyTrojan-Spy.Win32.Stealer.afhu
BitDefenderGen:Variant.Dopping.1
TencentWin32.Trojan-spy.Stealer.Afrh
Ad-AwareGen:Variant.Dopping.1
EmsisoftGen:Variant.Dopping.1 (B)
TrendMicroTROJ_GEN.R03BC0DJV21
McAfee-GW-EditionBehavesLike.Win32.Generic.dc
SophosMal/Generic-S
GDataWin32.Trojan.Sabsik.B
AviraHEUR/AGEN.1235899
ArcabitTrojan.Dopping.1
ZoneAlarmTrojan-Spy.Win32.Stealer.afhu
MicrosoftTrojan:MSIL/RedLine.RPS!MTB
CynetMalicious (score: 100)
Acronissuspicious
McAfeeArtemis!73555C7A696E
MAXmalware (ai score=82)
VBA32Trojan-Stealer.MSIL.gen
MalwarebytesSpyware.RedLineStealer
APEXMalicious
RisingSpyware.Agent!8.C6 (CLOUD)
YandexTrojanSpy.Stealer!ivaSoWC1ALM
SentinelOneStatic AI – Malicious PE
FortinetMSIL/Agent.DOC!tr.spy
Cybereasonmalicious.a696e1
PandaTrj/CI.A

How to remove Trojan-Spy.Win32.Stealer.afhu?

Trojan-Spy.Win32.Stealer.afhu removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment