Spy Trojan

Should I remove “Trojan-Spy.Win32.Stealer.agg”?

Malware Removal

The Trojan-Spy.Win32.Stealer.agg is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Spy.Win32.Stealer.agg virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Creates RWX memory
  • The binary likely contains encrypted or compressed data.
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Attempts to modify proxy settings
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine Trojan-Spy.Win32.Stealer.agg?


File Info:

crc32: BC17C2C5
md5: 0e9b0fcc777b6daf2055eded6ecaebcf
name: 0E9B0FCC777B6DAF2055EDED6ECAEBCF.mlw
sha1: 0a26626ea3b250688cd19da9a5ca9d482edbf556
sha256: b82c8ad77e94a127216caf7af7b91bdafe078a0b20262290b5b23052e141e054
sha512: 190491b15dc91536a287e063b057ac629662ff62c4c8afab1c35afe94356b881903b2f10e79d3bf4cfc283578bee6eab85740fddd2c6cd8187168130d7b4f490
ssdeep: 3072:dqLrR2poYRNw2G6w/ER2bP2GJuVKlJC7eZij4DI22Xf7fMV/7z/5uA:dqL9Aosw2Gt+2bT0Vax9Dt2XTfM1Pw
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

InternalName: asdgsdfgsdfg.exe
FileVersion: 1.0.0.1
ProductVersion: 1.0.0.1
Translation: 0x0809 0x04b0

Trojan-Spy.Win32.Stealer.agg also known as:

BkavW32.AIDetect.malware1
K7AntiVirusTrojan ( 00516fdf1 )
LionicTrojan.Win32.Stealer.4!c
Elasticmalicious (high confidence)
DrWebTrojan.PWS.Stealer.24814
CynetMalicious (score: 100)
ALYacTrojan.Brsecmon.1
CylanceUnsafe
ZillyaTrojan.Stealer.Win32.919
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (D)
AlibabaTrojanSpy:Win32/Stealer.8ebc47b9
K7GWTrojan ( 00516fdf1 )
Cybereasonmalicious.c777b6
CyrenW32/Kryptik.NL.gen!Eldorado
ESET-NOD32a variant of Win32/Kryptik.GLKY
APEXMalicious
AvastWin32:Malware-gen
KasperskyTrojan-Spy.Win32.Stealer.agg
BitDefenderTrojan.Brsecmon.1
NANO-AntivirusTrojan.Win32.Stealer.fiwprl
MicroWorld-eScanTrojan.Brsecmon.1
TencentWin32.Trojan-spy.Stealer.Isx
Ad-AwareTrojan.Brsecmon.1
SophosMal/Generic-S + Mal/GandCrab-G
ComodoTrojWare.Win32.Ransom.Gandcrab.S@7wwdn1
BitDefenderThetaGen:NN.ZexaF.34796.ou0@aiNBHRli
VIPRETrojan.Win32.Generic!BT
TrendMicroTrojan.Win32.SODINOK.SM.hp
McAfee-GW-EditionBehavesLike.Win32.Trojan.dh
FireEyeGeneric.mg.0e9b0fcc777b6daf
EmsisoftTrojan.Brsecmon.1 (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Propagate.dp
WebrootW32.Trojan.Gen
Antiy-AVLTrojan/Generic.ASMalwS.286AE00
MicrosoftRansom:Win32/Gandcrab.G!MTB
ZoneAlarmTrojan-Spy.Win32.Stealer.agg
GDataTrojan.Brsecmon.1
AhnLab-V3Trojan/Win32.Agent.R238646
Acronissuspicious
McAfeeTrojan-FQDF!0E9B0FCC777B
MAXmalware (ai score=95)
VBA32BScope.Trojan.Propagate
MalwarebytesMalware.AI.3682670268
PandaTrj/GdSda.A
TrendMicro-HouseCallTrojan.Win32.SODINOK.SM.hp
RisingTrojan.Generic@ML.100 (RDML:qT7xcVv8tA4+GNoC2WWXAA)
YandexTrojan.GenAsa!PPDpfIV9ocA
IkarusTrojan-Ransom.GandCrab
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.GLKY!tr
AVGWin32:Malware-gen
Paloaltogeneric.ml
Qihoo-360Win32/Ransom.GandCrab.HgIASOQA

How to remove Trojan-Spy.Win32.Stealer.agg?

Trojan-Spy.Win32.Stealer.agg removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment