Spy Trojan

Should I remove “Trojan-Spy.Win32.Stealer.akze”?

Malware Removal

The Trojan-Spy.Win32.Stealer.akze is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Spy.Win32.Stealer.akze virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Exhibits possible ransomware file modification behavior
  • Uses suspicious command line tools or Windows utilities

How to determine Trojan-Spy.Win32.Stealer.akze?


File Info:

name: 106899415EC5BAEC9D27.mlw
path: /opt/CAPEv2/storage/binaries/f836e1bfc40c7f51f6bf1e750e65b39e5cffc1b4e2b49bfc92b7a279a01acb0f
crc32: 637E9922
md5: 106899415ec5baec9d27d04b75f48ee7
sha1: 18c00bc6df3daa8655a00c880ad3cdfce7baa920
sha256: f836e1bfc40c7f51f6bf1e750e65b39e5cffc1b4e2b49bfc92b7a279a01acb0f
sha512: 513164195851a565d906e17c2dc4d651bd3efa1ebee798ecb0e5596a7843fe589e6e0c8efce68953fe523d3380f28ca24feb7b54a4d6eb8dbcae9cc6e0f6f2e4
ssdeep: 196608:JYPy+AAyMdgErVa1GdLgknGPVtbYe8WLfZ:JOByM2o8odL+bYat
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T10576123BB268613EC46A0A31457FD26099FBAE51A51A8C1E43F0390DCFFE4E11F3A655
sha3_384: 8680782d257314b645f3c686c2760a71e651ef3635ace326e20d8769bdc16155e4963b53f3af696fe97e96dfb8c470c7
ep_bytes: 558bec83c4a453565733c08945c48945
timestamp: 2021-06-03 08:09:11

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName: Paint net, Inc.
FileDescription: Paint Net Setup
FileVersion:
LegalCopyright:
OriginalFileName:
ProductName: Paint Net
ProductVersion: 1.0.5
Translation: 0x0000 0x04b0

Trojan-Spy.Win32.Stealer.akze also known as:

MicroWorld-eScanTrojan.GenericKD.47501576
FireEyeTrojan.GenericKD.47501576
ALYacTrojan.GenericKD.47501576
K7AntiVirusTrojan ( 0058a4ac1 )
AlibabaTrojanSpy:Win32/Stealer.13a8be52
K7GWTrojan ( 0058a4ac1 )
CyrenW32/MSIL_Kryptik.GEE.gen!Eldorado
SymantecTrojan.Gen.2
ESET-NOD32a variant of MSIL/Kryptik.ADLB
TrendMicro-HouseCallTROJ_GEN.R002C0WKT21
KasperskyTrojan-Spy.Win32.Stealer.akze
BitDefenderTrojan.GenericKD.47501576
AvastWin32:PWSX-gen [Trj]
Ad-AwareTrojan.GenericKD.47501576
EmsisoftTrojan.GenericKD.47501576 (B)
TrendMicroTROJ_GEN.R002C0WKT21
McAfee-GW-EditionBehavesLike.Win32.BadFile.vc
SophosMal/Generic-S
GDataTrojan.GenericKD.47501576
AviraTR/Kryptik.kezjx
ArcabitTrojan.Generic.D2D4D108
MicrosoftTrojan:Win32/Tiggre!rfn
CynetMalicious (score: 99)
McAfeeArtemis!106899415EC5
MAXmalware (ai score=88)
VBA32Backdoor.Agent
YandexTrojan.Kryptik!1aitL6UflNE
IkarusTrojan.MSIL.Crypt
FortinetMSIL/Kryptik.ADLB!tr
AVGWin32:PWSX-gen [Trj]
PandaTrj/CI.A

How to remove Trojan-Spy.Win32.Stealer.akze?

Trojan-Spy.Win32.Stealer.akze removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment