Spy Trojan

What is “Trojan-Spy.Win32.Stealer.ana”?

Malware Removal

The Trojan-Spy.Win32.Stealer.ana is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Spy.Win32.Stealer.ana virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • The binary likely contains encrypted or compressed data.
  • Attempts to modify proxy settings
  • Collects information to fingerprint the system

How to determine Trojan-Spy.Win32.Stealer.ana?


File Info:

crc32: 573FDB4E
md5: 67ea9086ecd8c75e082e76f9f5e59bde
name: 67EA9086ECD8C75E082E76F9F5E59BDE.mlw
sha1: df208b3106c03f96c5867d050ef96597f4962669
sha256: 63833601335f2f2db989a1f0ab15327c3055db099fb98694101094c7af42bd1e
sha512: 1f7ca448cef416a166a18c545efcb8f0f6e6679bf6f78e0ade2bab0a7ed63ff2767f2b8b244404f554bc8a2f104c5363790ebcaf4389a81ea0294459e3715793
ssdeep: 12288:FNjpR9/a37Wlhfncw0XbsQUToVhgMCVh3Gb5YVMYSaY2e8xFZ4YSpVo8MwvAqV5k:Fz/a3ylhRgc
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright xa9. All rights reserved.
InternalName: HavingLittle
FileVersion: 3.5.3.5
CompanyName: C.O.M.O.D.O.
LegalTrademarks: Copyright xa9. All rights reserved.
Comments: Setrendermode Msau Basket Researches Brings
ProductName: HavingLittle
ProductVersion: 3.5.3.5
FileDescription: Setrendermode Msau Basket Researches Brings
OriginalFilename: HavingLittle.exe
Translation: 0x0409 0x04b0

Trojan-Spy.Win32.Stealer.ana also known as:

K7AntiVirusRiskware ( 0040eff71 )
Elasticmalicious (high confidence)
DrWebTrojan.PWS.Stealer.24814
CynetMalicious (score: 100)
CAT-QuickHealTrojan.Mauvaise.SL1
ALYacTrojan.GenericKD.31277321
CylanceUnsafe
ZillyaTrojan.Stealer.Win32.1001
SangforTrojan.Win32.Stealer.ana
CrowdStrikewin/malicious_confidence_100% (D)
AlibabaTrojanSpy:Win32/Stealer.c8909078
K7GWRiskware ( 0040eff71 )
Cybereasonmalicious.6ecd8c
SymantecTrojan Horse
ESET-NOD32Win32/PSW.Delf.OSF
APEXMalicious
AvastWin32:Malware-gen
KasperskyTrojan-Spy.Win32.Stealer.ana
BitDefenderTrojan.GenericKD.31277321
NANO-AntivirusTrojan.Win32.Stealer.fjfmwl
MicroWorld-eScanTrojan.GenericKD.31277321
TencentWin32.Trojan-spy.Stealer.Wrqw
Ad-AwareTrojan.GenericKD.31277321
SophosMal/Generic-S
ComodoMalware@#1mbsau9sis3ty
BitDefenderThetaGen:NN.ZexaF.34692.Dq0@aCh2cRii
VIPRETrojan.Win32.Generic!BT
TrendMicroRansom_HPLOCKY.SME1
McAfee-GW-EditionBehavesLike.Win32.Injector.gh
FireEyeGeneric.mg.67ea9086ecd8c75e
EmsisoftTrojan.GenericKD.31277321 (B)
SentinelOneStatic AI – Suspicious PE
JiangminTrojanSpy.Stealer.gs
AviraTR/PSW.Agent.bthox
Antiy-AVLTrojan/Generic.ASMalwS.287CE5E
MicrosoftTrojan:Win32/Gandcrab!rfn
ArcabitTrojan.Generic.D1DD4109
AegisLabTrojan.Win32.Stealer.4!c
ZoneAlarmTrojan-Spy.Win32.Stealer.ana
GDataTrojan.GenericKD.31277321
AhnLab-V3Malware/Win32.Ransom_hplocky.C2814233
McAfeeArtemis!67EA9086ECD8
VBA32BScope.Backdoor.Androm
PandaTrj/CI.A
TrendMicro-HouseCallRansom_HPLOCKY.SME1
YandexTrojanSpy.Stealer!KsAX1NHgf1k
IkarusTrojan-Spy.Remcos
FortinetW32/Kryptik.GLHS!tr.ransom
AVGWin32:Malware-gen
Paloaltogeneric.ml

How to remove Trojan-Spy.Win32.Stealer.ana?

Trojan-Spy.Win32.Stealer.ana removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment