Spy Trojan

Trojan-Spy.Win32.Stealer.apza (file analysis)

Malware Removal

The Trojan-Spy.Win32.Stealer.apza is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Spy.Win32.Stealer.apza virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Dynamic (imported) function loading detected
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • Enumerates the modules from a process (may be used to locate base addresses in process injection)
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Tries to suspend Cuckoo threads to prevent logging of malicious activity
  • Tries to unhook or modify Windows functions monitored by Cuckoo
  • Anomalous binary characteristics

How to determine Trojan-Spy.Win32.Stealer.apza?


File Info:

name: 46735567244351200790.mlw
path: /opt/CAPEv2/storage/binaries/a331a8953c312e840ba11025cc1cdbe803683b617b5bcf95b5026c418ce2cfb8
crc32: 06F00384
md5: 4673556724435120079038814447f36a
sha1: 46cad8a93ec73cb09475eaf26322f7e064a13a27
sha256: a331a8953c312e840ba11025cc1cdbe803683b617b5bcf95b5026c418ce2cfb8
sha512: 3b59270e61ee578d5130cfd217d91dc7c3266074676d4576133c06d1fb1a04ea8bd02d378c9f193fb5058e4f348211849d27d01e0e5a9dd01500218e25b5ac27
ssdeep: 98304:0i1Ij3lbuVq/QMmrxFzWjX+qgO+9FLiacAZYMPs4XB2lST7DbNQbn6p:0qyluQY5LWr+qy9fHVPs8B20nDbQ6p
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T1204623671A354145F0E48C3AC627BDE571F20F6A4A826C3815DBBDC62732AE4F217E93
sha3_384: 7431a30e057f3432228d2b565a4dc495d0881fa636ed8f5af9a0d084d96f129f0296bcefe2d9ce2cbd565b975b1cbf48
ep_bytes: 684bf2a100e8baceffff8b5425008a4d
timestamp: 2012-07-13 22:47:16

Version Info:

FileDescription:
FileVersion: 0.0.0.0
InternalName: Implosions.exe
LegalCopyright:
OriginalFilename: Implosions.exe
ProductVersion: 0.0.0.0
Assembly Version: 0.0.0.0
Translation: 0x0000 0x04b0

Trojan-Spy.Win32.Stealer.apza also known as:

LionicTrojan.Win32.Generic.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKD.47635729
FireEyeGeneric.mg.4673556724435120
McAfeeArtemis!467355672443
CylanceUnsafe
K7AntiVirusTrojan ( 00588eeb1 )
BitDefenderTrojan.GenericKD.47635729
K7GWTrojan ( 00588eeb1 )
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Packed.VMProtect.YU
Paloaltogeneric.ml
KasperskyTrojan-Spy.Win32.Stealer.apza
AlibabaTrojanSpy:Win32/Stealer.d9d471ff
Ad-AwareTrojan.GenericKD.47635729
SophosMal/Generic-S
TrendMicroTROJ_GEN.R067C0WLH21
McAfee-GW-EditionArtemis!PUP
EmsisoftTrojan.GenericKD.47635729 (B)
IkarusTrojan.Win32.VMProtect
eGambitPE.Heur.InvalidSig
AviraTR/Crypt.XPACK.Gen2
MAXmalware (ai score=87)
GridinsoftRansom.Win32.Sabsik.sa
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
GDataMSIL.Trojan-Stealer.Redline.DP6TDO
CynetMalicious (score: 100)
AhnLab-V3HackTool/Win32.Agent.R342140
BitDefenderThetaGen:NN.ZexaF.34084.@B2@a8lv7@d
ALYacTrojan.GenericKD.47635729
VBA32TScope.Malware-Cryptor.SB
MalwarebytesSpyware.RedLineStealer
PandaTrj/CI.A
TrendMicro-HouseCallTROJ_GEN.R067C0WLH21
YandexTrojan.GenAsa!u0gH+a0TujA
FortinetW32/VMProtect.JG!tr
AVGFileRepMalware

How to remove Trojan-Spy.Win32.Stealer.apza?

Trojan-Spy.Win32.Stealer.apza removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment