Spy Trojan

Trojan-Spy.Win32.Stealer.amtu removal

Malware Removal

The Trojan-Spy.Win32.Stealer.amtu is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Spy.Win32.Stealer.amtu virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Authenticode signature is invalid
  • A scripting utility was executed
  • Uses Windows utilities for basic functionality
  • Uses Windows utilities for basic functionality
  • Behavioural detection: Injection (Process Hollowing)
  • Executed a process and injected code into it, probably while unpacking
  • Behavioural detection: Injection (inter-process)
  • Checks for the presence of known windows from debuggers and forensic tools
  • Created a process from a suspicious location
  • Attempts to disable Windows Defender
  • Attempts to modify Windows Defender using PowerShell
  • Attempts to execute suspicious powershell command arguments

How to determine Trojan-Spy.Win32.Stealer.amtu?


File Info:

name: BF6D3A80DB092F36C9FB.mlw
path: /opt/CAPEv2/storage/binaries/1b4a8b9787ede5a718fd42df72f5cd0a6708f5b519c6268e32830f58758d9788
crc32: 178E01BC
md5: bf6d3a80db092f36c9fb4a9f102e9b82
sha1: 4b0813ea4754c0427624ac7af9000702eec628cc
sha256: 1b4a8b9787ede5a718fd42df72f5cd0a6708f5b519c6268e32830f58758d9788
sha512: b7dbfa2d3a4a210ba108a67c35ae575a1ffc5d110ecb5e84fb22bf8643e21cdfd1dc91005f276d99c0af1c90f5baedee5e288716b397dbb63b03a7a8306dde60
ssdeep: 393216:Ju4apDEEBs+ZcOlB+2jD32AwaoheCcmSYoZnAUd:JuZA9+ZcOPnjDTCcmrWn9d
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1C5F63319251DBC8AF897AFB2C8F4D4604D8670BCE9FC4B11072964F2DBA9390856FE5C
sha3_384: 57fa0eab0bd5b1b812d26d1f5ada13206c6b0a7d06bc3480da1c8f3b240e3cb58e3e3589efb1d6d7a3e4d27d8c243137
ep_bytes: 81ecd40200005356576a205f33db6801
timestamp: 2020-08-01 02:44:18

Version Info:

0: [No Data]

Trojan-Spy.Win32.Stealer.amtu also known as:

Elasticmalicious (high confidence)
CAT-QuickHealPUA.GenericPMF.S24746672
ALYacTrojan.GenericKD.47521901
MalwarebytesTrojan.Dropper.SFX.Generic
Cybereasonmalicious.0db092
CyrenW32/Stealer.S.gen!Eldorado
ESET-NOD32multiple detections
APEXMalicious
ClamAVWin.Packed.Barys-9859531-0
KasperskyTrojan-Spy.Win32.Stealer.amtu
BitDefenderTrojan.GenericKDZ.81116
NANO-AntivirusTrojan.Win32.Steam.jiqpte
AvastWin32:TrojanX-gen [Trj]
DrWebTrojan.PWS.Steam.23047
TrendMicroTROJ_GEN.R002C0PL621
McAfee-GW-EditionBehavesLike.Win32.Generic.vc
FireEyeGeneric.mg.bf6d3a80db092f36
EmsisoftTrojan.GenericKDZ.81116 (B)
GDataTrojan.GenericKD.47521901
eGambitUnsafe.AI_Score_99%
AviraHEUR/AGEN.1144141
Antiy-AVLTrojan/Generic.ASMalwS.34CEFF5
KingsoftWin32.PSWTroj.Undef.(kcloud)
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
MAXmalware (ai score=83)
VBA32Trojan.Zapchast
TrendMicro-HouseCallTROJ_GEN.R002C0PL621
RisingDropper.Agent/NSIS!1.D805 (CLASSIC:xYO3Ib1781GpIUzE6hsaTA)
FortinetW32/BSE.4Q7Q!tr
AVGWin32:TrojanX-gen [Trj]

How to remove Trojan-Spy.Win32.Stealer.amtu?

Trojan-Spy.Win32.Stealer.amtu removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment