Spy Trojan

About “Trojan-Spy.Win32.Stealer.akkv” infection

Malware Removal

The Trojan-Spy.Win32.Stealer.akkv is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Spy.Win32.Stealer.akkv virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Enumerates the modules from a process (may be used to locate base addresses in process injection)
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Latvian
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • CAPE detected the RedLine malware family
  • Anomalous binary characteristics

How to determine Trojan-Spy.Win32.Stealer.akkv?


File Info:

name: F7E24286D5DC593C130B.mlw
path: /opt/CAPEv2/storage/binaries/7f54cd73db6db1935d7acb17555e03fe0096d97a32e2ef4d9323dc34e55634dc
crc32: 1C9F4D29
md5: f7e24286d5dc593c130b9573c6990cf4
sha1: 1436f72cf0bcdaa5db20ac5eeb03452bdd9d0306
sha256: 7f54cd73db6db1935d7acb17555e03fe0096d97a32e2ef4d9323dc34e55634dc
sha512: 81f087eedc2288c15f96128b0f617a9a142f43d08a635e8d9d9e6f9ff06a43c5b88ed83da698752e626ac9edf4f6f8f08ed3d565d8852b1b5745ed0fe5a0b662
ssdeep: 3072:2aeVxvbVOSfTn09P8eu5WFkk2vo5H2slJ/YlR+/cXR/B3dAFfHTvAQqva2z8:CVxvbwmz0N8sDV5HDlJwRoslgvAVF4
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T14844F1323AA05431EAA70E3150B0D3B95B3BB5B32B7581CB2769577E2D603D24BA1747
sha3_384: 1d70305f160cc1db43a3b35850b524f9028d1fcbb06a866275c373ac1556295c5edbacbf240faf652b25f35ff77ac86f
ep_bytes: e8502a0000e989feffffcccccccccccc
timestamp: 2021-03-29 15:21:12

Version Info:

InternalName: bomgpiaruci.iwa
Copyright: Copyrighz (C) 2021, fudkat
ProductVersion: 13.54.77.27
Translation: 0x0114 0x046a

Trojan-Spy.Win32.Stealer.akkv also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKDZ.80746
FireEyeGeneric.mg.f7e24286d5dc593c
ALYacTrojan.GenericKDZ.80746
CylanceUnsafe
K7AntiVirusTrojan ( 00589d2d1 )
K7GWTrojan ( 00589d2d1 )
Cybereasonmalicious.cf0bcd
BitDefenderThetaGen:NN.ZexaF.34294.pq1@a4h@ddoI
CyrenW32/Kryptik.FUG.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.HNKZ
KasperskyTrojan-Spy.Win32.Stealer.akkv
BitDefenderTrojan.GenericKDZ.80746
AvastWin32:PWSX-gen [Trj]
Ad-AwareTrojan.GenericKDZ.80746
SophosTroj/Krypt-BO
McAfee-GW-EditionLockbit-FSWW!F7E24286D5DC
EmsisoftTrojan.GenericKDZ.80746 (B)
APEXMalicious
GDataWin32.Trojan.BSE.11GYDBI
JiangminBackdoor.Agent.kye
MaxSecureTrojan.Malware.300983.susgen
AviraTR/AD.GenSHCode.rcdki
ArcabitTrojan.Generic.D13B6A
MicrosoftTrojan:Win32/Azorult.RT!MTB
CynetMalicious (score: 100)
AhnLab-V3Malware/Win.FSWW.R452961
Acronissuspicious
McAfeeLockbit-FSWW!F7E24286D5DC
MAXmalware (ai score=82)
VBA32Backdoor.Mokes
MalwarebytesTrojan.MalPack.GS
SentinelOneStatic AI – Malicious PE
eGambitPE.Heur.InvalidSig
FortinetW32/Lockbit.FSWW!tr
AVGWin32:PWSX-gen [Trj]
PandaTrj/GdSda.A
CrowdStrikewin/malicious_confidence_90% (W)

How to remove Trojan-Spy.Win32.Stealer.akkv?

Trojan-Spy.Win32.Stealer.akkv removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment