Spy Trojan

Trojan-Spy.Win32.Stealer.akzg removal tips

Malware Removal

The Trojan-Spy.Win32.Stealer.akzg is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Spy.Win32.Stealer.akzg virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Uses suspicious command line tools or Windows utilities

How to determine Trojan-Spy.Win32.Stealer.akzg?


File Info:

name: B87CF8F07B65345431FC.mlw
path: /opt/CAPEv2/storage/binaries/c19f3b398f9f50be0c9e8bac7d80268241ebc754d588a2bc30c6f2604bd14b8e
crc32: 1ADE99C8
md5: b87cf8f07b65345431fcfc9ebd32b02b
sha1: 130508c1cf3035740d3d598f42a9265652ce9ae0
sha256: c19f3b398f9f50be0c9e8bac7d80268241ebc754d588a2bc30c6f2604bd14b8e
sha512: 04faf67d4903ebe9c1ba680449595acb039a5b9b657390d4c2c74dcd922b4a18efeadeeeaade8915ca20b93655dc379c5b71f31e379c6dcdc290445ad6d8d146
ssdeep: 24576:t4nXubIQGyxbPV0db26WwjSk8FJVUtDsv1Et9uGpckT52zedlq89Ws5uIzk5aM/d:tqe3f6tSTUtASffPMWrQ0ZkD
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T16485C03FF268A53EC45A1B3245B39250997BBA60B81A8C1F07FC384DCF765601E3B656
sha3_384: 100a14c61974b53edd77fa53ab16d9bdea9323953a3f32d5733930e96b4a2e6406fc77602953b7c8785d2d6c8a838f2b
ep_bytes: 558bec83c4a453565733c08945c48945
timestamp: 2021-06-03 08:09:11

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName: Paint net, Inc.
FileDescription: Paint Net Setup
FileVersion:
LegalCopyright:
OriginalFileName:
ProductName: Paint Net
ProductVersion: 1.0.5
Translation: 0x0000 0x04b0

Trojan-Spy.Win32.Stealer.akzg also known as:

BkavW32.AIDetect.malware2
LionicTrojan.Win32.Agent.m!c
MicroWorld-eScanTrojan.GenericKD.38126055
FireEyeTrojan.GenericKD.38126055
ALYacTrojan.GenericKD.38126055
K7AntiVirusTrojan ( 0058a4ac1 )
AlibabaTrojanSpy:Win32/Stealer.eb20d031
K7GWTrojan ( 0058a4ac1 )
CyrenW32/MSIL_Kryptik.GEE.gen!Eldorado
SymantecTrojan.Gen.2
ESET-NOD32a variant of MSIL/Kryptik.ADLB
KasperskyTrojan-Spy.Win32.Stealer.akzg
BitDefenderTrojan.GenericKD.38126055
AvastWin32:PWSX-gen [Trj]
Ad-AwareTrojan.GenericKD.38126055
SophosMal/Generic-S
McAfee-GW-EditionBehavesLike.Win32.Dropper.tc
EmsisoftTrojan.GenericKD.38126055 (B)
GDataTrojan.GenericKD.38126055
AviraTR/AD.Inject.cmyyn
ArcabitTrojan.Generic.D245C1E7
MicrosoftTrojan:Win32/Wacatac.B!ml
CynetMalicious (score: 100)
McAfeeArtemis!B87CF8F07B65
MAXmalware (ai score=80)
TrendMicro-HouseCallTROJ_GEN.R002H0DKQ21
IkarusTrojan.MSIL.Crypt
FortinetMSIL/Kryptik.ADLB!tr
BitDefenderThetaGen:NN.ZemsilCO.34294.Cm2@aehd!ob
AVGWin32:PWSX-gen [Trj]
PandaTrj/CI.A
MaxSecureTrojan.Malware.300983.susgen

How to remove Trojan-Spy.Win32.Stealer.akzg?

Trojan-Spy.Win32.Stealer.akzg removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment